{"id":70309,"date":"2021-09-01T04:10:05","date_gmt":"2021-09-01T08:10:05","guid":{"rendered":"http:\/\/bangla.salearningschool.com\/recent-posts\/encryption-and-net-net-web-applications\/"},"modified":"2021-09-01T04:10:05","modified_gmt":"2021-09-01T08:10:05","slug":"encryption-and-net-net-web-applications","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=70309","title":{"rendered":"Encryption and .Net #.Net Web Applications"},"content":{"rendered":"<p>Brought from our old site: http:\/\/salearningschool.com\/displayArticle.php?table=Articles&amp;articleID=1355&amp;title=Encryption%20and%20.Net<\/p>\n<p>Encryption and .Net<\/p>\n<p>Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features.<\/p>\n<p>There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that represents the uniqueness of a large block of data. In Symmetric Encryption, a single key is used for both encryption and decryption. In Asymmetric encryption, two different keys are used, one for encryption and another one for decryption. In real world applications, a combination of all three methods are  used to provide better security.<\/p>\n<p>A digital transmission of a check can be as follows: create the hash of the check, encrypt the hash with the public key using asymmetric encryption, apply the encrypted hash on the document,  encrypt the symmetric encryption key with asymmetric encryption method, encrypt the check with symmetric encryption, transmit the encrypted key and encrypted document to the receiver<\/p>\n<p>Hash Example<\/p>\n<pre style=\"padding:20px\">\n   hash = New Encryption.Hash(Encryption.Hash.Provider.CRC32)\n   data = New  Encryption.Data(\"Hash Browns\")\n   hash.Calculate(data)\n<\/pre>\n<p>Symmetric example:<\/p>\n<pre style=\"padding:20px\">\n    sym = New Encryption.Symmetric(Encryption.Symmetric.Provider.Rijndael)\n    key = New Encryption.Data(\"Pass\")\n    Encryption.Data encryptedData;\n    encryptedData = sym.Encrypt(New Encryption.Data(\"Secret\"), key)\n    string base64EncryptedString = encryptedData.ToBase64\n<\/pre>\n<p>Asymmetric Example<\/p>\n<pre style=\"padding:20px\">  \n        asym = New Encryption.Asymmetric\n    pubkey = New Encryption.Asymmetric.PublicKey\n    privkey = New Encryption.Asymmetric.PrivateKey\n    asym.GenerateNewKeyset(pubkey, privkey)\n\n    secret = \"ancient chinese\"\n    Encryption.Data encryptedData\n    encryptedData = asym.Encrypt(New Encryption.Data(secret), pubkey)\n    Encryption.Data decryptedData \n    asym2 = New Encryption.Asymmetric\n    decryptedData = asym2.Decrypt(encryptedData, privkey)\n<\/pre>\n<p>From: http:\/\/sitestree.com\/?p=3742<br \/> Categories:.Net Web Applications<br \/>Tags:<br \/> Post Data:2016-07-16 12:15:58<\/p>\n<pre><code>    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com\/' target='new' rel=\"noopener\"&gt;https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    (Big Data, Cloud, Security, Machine Learning): Courses: &lt;a href='http:\/\/Training.SitesTree.com' target='new' rel=\"noopener\"&gt; http:\/\/Training.SitesTree.com&lt;\/a&gt; \n    In Bengali: &lt;a href='http:\/\/Bangla.SaLearningSchool.com' target='new' rel=\"noopener\"&gt;http:\/\/Bangla.SaLearningSchool.com&lt;\/a&gt;\n    &lt;a href='http:\/\/SitesTree.com' target='new' rel=\"noopener\"&gt;http:\/\/SitesTree.com&lt;\/a&gt;\n    8112223 Canada Inc.\/JustEtc: &lt;a href='http:\/\/JustEtc.net' target='new' rel=\"noopener\"&gt;http:\/\/JustEtc.net (Software\/Web\/Mobile\/Big-Data\/Machine Learning) &lt;\/a&gt;\n    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com'&gt; https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    Medium: &lt;a href='https:\/\/medium.com\/@SayedAhmedCanada' target='new' rel=\"noopener\"&gt; https:\/\/medium.com\/@SayedAhmedCanada &lt;\/a&gt;\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Brought from our old site: http:\/\/salearningschool.com\/displayArticle.php?table=Articles&amp;articleID=1355&amp;title=Encryption%20and%20.Net Encryption and .Net Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features. There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that represents the uniqueness of a &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=70309\">Continue reading<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1917],"tags":[],"class_list":["post-70309","post","type-post","status-publish","format-standard","hentry","category-fromsitestree-com","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":69918,"url":"http:\/\/bangla.sitestree.com\/?p=69918","url_meta":{"origin":70309,"position":0},"title":"Encryption and .Net #19","author":"Author-Check- Article-or-Video","date":"August 22, 2021","format":false,"excerpt":"Encryption and .Net Dot net provides rich support for data encryption. the namespace System.Security.Cryptography includes the encryption features.There are three primary concepts related to encryption such as Hashing, Symmetric Encryption, and Asymmetric encryption. A hash is a data fingerprint, a small data that represents the uniqueness of a large block\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7514,"url":"http:\/\/bangla.sitestree.com\/?p=7514","url_meta":{"origin":70309,"position":1},"title":".Net \u098f \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8","author":"Author-Check- Article-or-Video","date":"March 25, 2015","format":false,"excerpt":".Net \u098f \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 -------------------------------- .Net \u09a1\u09be\u099f\u09be \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09b8\u09ae\u09b0\u09cd\u09a5\u09a8 \u0995\u09b0\u09c7 \u09a5\u09be\u0995\u09c7\u0964 namespace System.Security.Cryptography \u098f\u09b0 \u09ae\u09a7\u09cd\u09af\u09c7 \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09ab\u09bf\u099a\u09be\u09b0 \u09a8\u09bf\u09b9\u09bf\u09a4 \u09b0\u09df\u09c7\u099b\u09c7\u0964 \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u09b8\u0982\u0995\u09cd\u09b0\u09be\u09a8\u09cd\u09a4 \u09a4\u09bf\u09a8\u099f\u09bf \u09aa\u09cd\u09b0\u09be\u09a5\u09ae\u09bf\u0995 \u09ac\u09bf\u09b7\u09df \u09b9\u09b2 Hashing, Symmetric Encryption \u098f\u09ac\u0982 Asymmetric encryption. - Hash \u098f\u0995\u099f\u09bf data \u09ab\u09bf\u0999\u09cd\u0997\u09be\u09b0\u09aa\u09cd\u09b0\u09bf\u09a8\u09cd\u099f , \u09af\u09be \u098f\u0995\u099f\u09bf \u09ac\u09c3\u09b9\u09ce data \u09ac\u09cd\u09b2\u0995 \u098f\u09b0 \u09b8\u09cd\u09ac\u09a4\u09a8\u09cd\u09a4\u09cd\u09b0\u09a4\u09be \u09aa\u09cd\u09b0\u0995\u09be\u09b6 \u0995\u09b0\u09c7\u0964 - Symmetric \u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8 \u098f\u0995\u099f\u09bf\u2026","rel":"","context":"In &quot;\u09a1\u099f \u09a8\u09c7\u099f\/.Net&quot;","block_context":{"text":"\u09a1\u099f \u09a8\u09c7\u099f\/.Net","link":"http:\/\/bangla.sitestree.com\/?cat=264"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":78585,"url":"http:\/\/bangla.sitestree.com\/?p=78585","url_meta":{"origin":70309,"position":2},"title":"SSH","author":"Author-Check- Article-or-Video","date":"November 4, 2025","format":false,"excerpt":"From AI tools as is \ud83d\udd10 Understanding SSH (Secure Shell): How It Works and Why It Matters When you connect to a remote server or transfer files securely over the internet, you\u2019re likely using SSH \u2014 Secure Shell. SSH has become the standard protocol for secure communication between computers, system\u2026","rel":"","context":"In &quot;Computer Networks&quot;","block_context":{"text":"Computer Networks","link":"http:\/\/bangla.sitestree.com\/?cat=1978"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":78587,"url":"http:\/\/bangla.sitestree.com\/?p=78587","url_meta":{"origin":70309,"position":3},"title":"SSH Interaction from AI Tools","author":"Author-Check- Article-or-Video","date":"November 4, 2025","format":false,"excerpt":"From AI Tools as is (We feed the steps initially): Absolutely! I\u2019ve updated the IP addresses, ephemeral port, and rewritten sentences for clarity while keeping it WordPress-friendly and SEO-ready. Here\u2019s the refreshed version: \ud83d\udd10 SSH Interaction and Session Establishment Explained Secure Shell (SSH) is the standard protocol for connecting securely\u2026","rel":"","context":"In &quot;Computer Networks&quot;","block_context":{"text":"Computer Networks","link":"http:\/\/bangla.sitestree.com\/?cat=1978"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1319,"url":"http:\/\/bangla.sitestree.com\/?p=1319","url_meta":{"origin":70309,"position":4},"title":"Lecture-02: (Encryption) &#8211; Computer Security 101 in Bangla (\u09b2\u09c7\u0995\u099a\u09be\u09b0-\u09e6\u09e8: (\u098f\u09a8\u0995\u09cd\u09b0\u09bf\u09aa\u09b6\u09a8) &#8211; \u09ac\u09be\u0982\u09b2\u09be\u09a6\u09c7\u09b6\u09c7 \u09e7\u09e6\u09e7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0 \u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be)","author":"Author-Check- Article-or-Video","date":"April 20, 2013","format":false,"excerpt":"","rel":"","context":"In &quot;Biology - Zoology&quot;","block_context":{"text":"Biology - Zoology","link":"http:\/\/bangla.sitestree.com\/?cat=62"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":66334,"url":"http:\/\/bangla.sitestree.com\/?p=66334","url_meta":{"origin":70309,"position":5},"title":"Java 2 Security Architecture #Java Short Notes","author":"Author-Check- Article-or-Video","date":"July 18, 2021","format":false,"excerpt":"Security Services Provide Data Integrity Data Confidentiality Access Control - Authentication and Authorization Encryption helps to provide such security services Core Java Security Architecture -- Core Java 2 Security Architecture -- Java Cryptography Architecture (JCA) -- Java Cryptography Extension (JCE) -- Java Secure Socket Extension (JSSE) -- Java Authentication and\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/70309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=70309"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/70309\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=70309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=70309"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=70309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}