{"id":69918,"date":"2021-08-22T04:10:05","date_gmt":"2021-08-22T08:10:05","guid":{"rendered":"http:\/\/bangla.salearningschool.com\/recent-posts\/encryption-and-net-19\/"},"modified":"2021-08-22T04:10:05","modified_gmt":"2021-08-22T08:10:05","slug":"encryption-and-net-19","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=69918","title":{"rendered":"Encryption and .Net #19"},"content":{"rendered":"<p>Encryption and .Net<\/p>\n<p>Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features.There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that represents the uniqueness of a large block of data. In Symmetric Encryption, a single key is used for both encryption and decryption. In Asymmetric encryption, two different keys are used, one for encryption and another one for decryption. In real world applications, a combination of all three methods are  used to provide better security.<\/p>\n<p>A digital transmission of a check can be as follows: create the hash of the check, encrypt the hash with the public key using asymmetric encryption, apply the encrypted hash on the document,  encrypt the symmetric encryption key with asymmetric encryption method, encrypt the check with symmetric encryption, transmit the encrypted key and encrypted document to the receiver<\/p>\n<p>Hash Example<\/p>\n<pre style=\"padding:20px\">   hash = New Encryption.Hash(Encryption.Hash.Provider.CRC32)   data = New  Encryption.Data(\"Hash Browns\")   hash.Calculate(data)<\/pre>\n<p>Symmetric example:<\/p>\n<pre style=\"padding:20px\"> sym = New Encryption.Symmetric(Encryption.Symmetric.Provider.Rijndael)  key = New Encryption.Data(\"Pass\")   Encryption.Data encryptedData;  encryptedData = sym.Encrypt(New Encryption.Data(\"Secret\"), key) string base64EncryptedString = encryptedData.ToBase64<\/pre>\n<p>Asymmetric Example<\/p>\n<pre style=\"padding:20px\">  asym = New Encryption.Asymmetric    pubkey = New Encryption.Asymmetric.PublicKey    privkey = New Encryption.Asymmetric.PrivateKey  asym.GenerateNewKeyset(pubkey, privkey) secret = \"ancient chinese\"  Encryption.Data encryptedData   encryptedData = asym.Encrypt(New Encryption.Data(secret), pubkey)   Encryption.Data decryptedData   asym2 = New Encryption.Asymmetric   decryptedData = asym2.Decrypt(encryptedData, privkey)<\/pre>\n<p>From: http:\/\/sitestree.com\/?p=5334<br \/> Categories:19<br \/>Tags:<br \/> Post Data:2010-04-30 02:01:13<\/p>\n<pre><code>    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com\/' target='new' rel=\"noopener\"&gt;https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    (Big Data, Cloud, Security, Machine Learning): Courses: &lt;a href='http:\/\/Training.SitesTree.com' target='new' rel=\"noopener\"&gt; http:\/\/Training.SitesTree.com&lt;\/a&gt; \n    In Bengali: &lt;a href='http:\/\/Bangla.SaLearningSchool.com' target='new' rel=\"noopener\"&gt;http:\/\/Bangla.SaLearningSchool.com&lt;\/a&gt;\n    &lt;a href='http:\/\/SitesTree.com' target='new' rel=\"noopener\"&gt;http:\/\/SitesTree.com&lt;\/a&gt;\n    8112223 Canada Inc.\/JustEtc: &lt;a href='http:\/\/JustEtc.net' target='new' rel=\"noopener\"&gt;http:\/\/JustEtc.net (Software\/Web\/Mobile\/Big-Data\/Machine Learning) &lt;\/a&gt;\n    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com'&gt; https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    Medium: &lt;a href='https:\/\/medium.com\/@SayedAhmedCanada' target='new' rel=\"noopener\"&gt; https:\/\/medium.com\/@SayedAhmedCanada &lt;\/a&gt;\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Encryption and .Net Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features.There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that represents the uniqueness of a large block of data. In Symmetric Encryption, &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=69918\">Continue reading<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1917],"tags":[],"class_list":["post-69918","post","type-post","status-publish","format-standard","hentry","category-fromsitestree-com","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":70309,"url":"http:\/\/bangla.sitestree.com\/?p=70309","url_meta":{"origin":69918,"position":0},"title":"Encryption and .Net #.Net Web Applications","author":"Author-Check- Article-or-Video","date":"September 1, 2021","format":false,"excerpt":"Brought from our old site: http:\/\/salearningschool.com\/displayArticle.php?table=Articles&articleID=1355&title=Encryption%20and%20.Net Encryption and .Net Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features. There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7514,"url":"http:\/\/bangla.sitestree.com\/?p=7514","url_meta":{"origin":69918,"position":1},"title":".Net \u098f \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8","author":"Author-Check- Article-or-Video","date":"March 25, 2015","format":false,"excerpt":".Net \u098f \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 -------------------------------- .Net \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09b8\u09ae\u09b0\u09cd\u09a5\u09a8 \u0995\u09b0\u09c7 \u09a5\u09be\u0995\u09c7\u0964 namespace System.Security.Cryptography \u098f\u09b0 \u09ae\u09a7\u09cd\u09af\u09c7 \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09ab\u09bf\u099a\u09be\u09b0 \u09a8\u09bf\u09b9\u09bf\u09a4 \u09b0\u09df\u09c7\u099b\u09c7\u0964 \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09b8\u0982\u0995\u09cd\u09b0\u09be\u09a8\u09cd\u09a4 \u09a4\u09bf\u09a8\u099f\u09bf \u09aa\u09cd\u09b0\u09be\u09a5\u09ae\u09bf\u0995 \u09ac\u09bf\u09b7\u09df \u09b9\u09b2 Hashing, Symmetric Encryption \u098f\u09ac\u0982 Asymmetric encryption. - Hash \u098f\u0995\u099f\u09bf data \u09ab\u09bf\u0999\u09cd\u0997\u09be\u09b0\u09aa\u09cd\u09b0\u09bf\u09a8\u09cd\u099f , \u09af\u09be \u098f\u0995\u099f\u09bf \u09ac\u09c3\u09b9\u09ce data \u09ac\u09cd\u09b2\u0995 \u098f\u09b0 \u09b8\u09cd\u09ac\u09a4\u09a8\u09cd\u09a4\u09cd\u09b0\u09a4\u09be \u09aa\u09cd\u09b0\u0995\u09be\u09b6 \u0995\u09b0\u09c7\u0964 - Symmetric \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u098f\u0995\u099f\u09bf\u2026","rel":"","context":"In &quot;\u09a1\u099f \u09a8\u09c7\u099f\/.Net&quot;","block_context":{"text":"\u09a1\u099f \u09a8\u09c7\u099f\/.Net","link":"http:\/\/bangla.sitestree.com\/?cat=264"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":78585,"url":"http:\/\/bangla.sitestree.com\/?p=78585","url_meta":{"origin":69918,"position":2},"title":"SSH","author":"Author-Check- Article-or-Video","date":"November 4, 2025","format":false,"excerpt":"From AI tools as is \ud83d\udd10 Understanding SSH (Secure Shell): How It Works and Why It Matters When you connect to a remote server or transfer files securely over the internet, you\u2019re likely using SSH \u2014 Secure Shell. SSH has become the standard protocol for secure communication between computers, system\u2026","rel":"","context":"In &quot;Computer Networks&quot;","block_context":{"text":"Computer Networks","link":"http:\/\/bangla.sitestree.com\/?cat=1978"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":78587,"url":"http:\/\/bangla.sitestree.com\/?p=78587","url_meta":{"origin":69918,"position":3},"title":"SSH Interaction from AI Tools","author":"Author-Check- Article-or-Video","date":"November 4, 2025","format":false,"excerpt":"From AI Tools as is (We feed the steps initially): Absolutely! I\u2019ve updated the IP addresses, ephemeral port, and rewritten sentences for clarity while keeping it WordPress-friendly and SEO-ready. Here\u2019s the refreshed version: \ud83d\udd10 SSH Interaction and Session Establishment Explained Secure Shell (SSH) is the standard protocol for connecting securely\u2026","rel":"","context":"In &quot;Computer Networks&quot;","block_context":{"text":"Computer Networks","link":"http:\/\/bangla.sitestree.com\/?cat=1978"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1319,"url":"http:\/\/bangla.sitestree.com\/?p=1319","url_meta":{"origin":69918,"position":4},"title":"Lecture-02: (Encryption) &#8211; Computer Security 101 in Bangla (\u09b2\u09c7\u0995\u099a\u09be\u09b0-\u09e6\u09e8: (\u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8) &#8211; \u09ac\u09be\u0982\u09b2\u09be\u09a6\u09c7\u09b6\u09c7 \u09e7\u09e6\u09e7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0 \u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be)","author":"Author-Check- Article-or-Video","date":"April 20, 2013","format":false,"excerpt":"","rel":"","context":"In &quot;Biology - Zoology&quot;","block_context":{"text":"Biology - Zoology","link":"http:\/\/bangla.sitestree.com\/?cat=62"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26256,"url":"http:\/\/bangla.sitestree.com\/?p=26256","url_meta":{"origin":69918,"position":5},"title":"Part-2: If you want to learn security, or if you already are a security professional\/engineer, can you answer the following questions on Security? Do you know (and can do) the answers to the following questions on Security? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"What are the important concepts to know and implement for Infrastructure security? Consider only the software side. What are patching, hardening, enabling encryption, filtering connections in regards to network infrastructure? What is the relation with security? What will you do in regards to these? How is software patching different for\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/69918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=69918"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/69918\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=69918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=69918"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=69918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}