winzip icon

Crypto Wrapper

Submitted on: 1/1/2015 2:35:00 PM
By: Stoney M. (from psc cd)  
Level: Advanced
User Rating: By 8 Users
Compatibility: VB.NET
Views: 2477
     This submission contains the source for a VB .NET library. The dll wraps the System.Security.Cryptography namespace. It does not by all means provide all of the functionality contained there, but it does offer easier use of Symmetric and Asymmetric keys and encryption. The standard way to communicate securely with Asymmetric (Key Pairs) encryption, is as follows... 1. Company 1 & Company 2 wish to communicate securely using asymmetric encryption. 2. Company 1 & Company 2 both generate Public and Private Keys. 3. Company 1 & Company 2 exchange Public keys. 4. Company 1 has a message to send to Company 2. 5. Company 1 generates a random symmetric key (session key). 6. Company 1 encrypts the data to be sent with the session key. 7. Company 1 "Signs" the encrypted data with their private key. 8. Company 1 encrypts the session key with Company 2's public key. 9. Company 1 sends the data. The signature verifies the source of the data. We use a symmetric key to encrypt the data because it may be large, and encryption with asymmetric keys is comparitively very, very, very slow. That is why only the symmetric key is encrypted with an asymmetric key. Also, when the data is "signed" with Company 1's private key, it actually hashes the data first, so its size will be quite small as well. This library was written specifically to provide the functionality required by the above scenario. That is why it's functionality is abbreviated when compared to the full Cryptography namespace.
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.

If you don't have a virus scanner, you can get one at many places on the net

Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Advanced category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)

Other User Comments

 There are no comments on this submission.

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)

To post feedback, first please login.