Chapter 4: Storing Secrets

Just to prove that I am still working on that book – here is the TOC for the “Storing Secrets” chapter.

  • Attacks and Attackers
  • Cryptography to the Rescue?
  • Hashing Data
    Hashing Algorithms, Hashing in .NET
  • Storing Passwords
    Using Salted and Iterated Hashes
  • Encrypting Data
    Symmetric Cryptography, Keys and Key Sizes, Generating Keys from Passwords, The ASP.NET Machine Key
  • Integrity Protection
  • Designing an Application that uses Symmetric Crypto
  • Asymmetric Cryptography
    Certificates, Certificate and Key Store, Signing and Encrypting Data, Decrypting Data and Verifying Signatures, Setting ACLs on Private Key Container Files
  • Designing an Application that uses Asymmetric Crypto
  • Windows Data Protection API
  • Protecting Configuration Files
  • Encrypting ViewState

more to come…

 

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s