Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core

Book Cover
Average Rating
Published
New York : Apress, [2019].
Status
Available Online

Description

Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects. What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed. Stephen Haunts is a software developer with experience across industry verticals, including game development, financial services, insurance, and healthcare. He specializes in security and cryptography and regularly speaks and presents at conferences and user groups about secure coding in .NET.

More Details

Format
Language
English
ISBN
9781484243756, 1484243757, 9781484243763, 1484243765
UPC
10.1007/978-1-4842-4375-6, 10.1007/978-1-4842-4

Notes

Bibliography
Includes bibliographical references and index.
Description
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects. What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed. Stephen Haunts is a software developer with experience across industry verticals, including game development, financial services, insurance, and healthcare. He specializes in security and cryptography and regularly speaks and presents at conferences and user groups about secure coding in .NET.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Intro; Table of Contents; About the Author; About the Technical Reviewer; Foreword; Introduction; Chapter 1: What Are Data Breaches?; Types of Data in a Breach and Their Consequences; The Impact on a Company; Financial Loss; Legal Action; Regulatory Impact; Loss of Reputation; Why Network Protection Isn't Enough; How Can Developers Help?; What Can You Expect from This Book?; What You Will Learn; .NET Standard and .NET Core; Code Samples in This Book; Chapter 2: A Brief History of Cryptography; Ancient Times; Increasing Cipher Complexity; Enigma and Mechanical Ciphers; Modern Cryptography
Symmetric EncryptionPublic and Private Key Cryptography; Why Is Cryptography Important?; Examples of Modern Cryptography; The Four Pillars of Modern Cryptography; Confidentiality; Integrity; Authentication; Non-Repudiation; Summary; Chapter 3: The Importance of Random Numbers; Generating Deterministic Random Numbers; Generating Secure Random Numbers; Summary; Chapter 4: Hashing and Hashed Message Authentication Codes; Hashing and Integrity; MD5; Secure Hash Algorithm (SHA) Family; Authenticated Hashing; Summary; Chapter 5: Safely Storing Passwords; Storing Passwords in the Clear
Encrypting PasswordsUsing Hashes to Store Passwords; Using Password Based Key Derivation Functions; Summary; Chapter 6: Symmetric Encryption; Symmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; History of DES and Triple DES; How DES and Triple DES Works; History of AES; How AES Works; How Secure Is AES Against Brute-Force Attacks?; API Commonality in the .NET Framework; Encryption Mode; Padding; Key; Initialization Vector (IV); AesManaged and AesCryptoServiceProvider
Performing Symmetric Encryption with .NETSummary; Chapter 7: Asymmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; What Is Asymmetric Encryption?; The History of RSA; How Does RSA Work?; Key Derivation; Encryption and Decryption; RSA in .NET; In-Memory Keys; XML-Based Keys; Cryptographic Service Provider; Encryption and Decryption; Summary; Chapter 8: Digital Signatures; High-Level Look at Digital Signatures; Digital Signatures in .NET; Summary; Chapter 9: Hybrid Encryption
Combining Symmetric and AsymmetricAdding Integrity Checks; Securely Comparing Byte Arrays; Extending with Digital Signatures; Summary; Chapter 10: Key Storage and Azure Key Vault; Exploring Key Management Options; Introducing Azure Key Vault; Azure Key Vault Hardware Mode; Azure Key Vault Software Mode; Keys vs. Secrets; Azure Key Vault Example Costs; Setting up Azure Key Vault; Creating a Key Vault; Registering Your Application with Azure Active Directory; Authorize Your Application to Use Keys and Secrets; Manually Creating Keys and Secrets; Add a Software Protected Key

Discover More

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Haunts, S. (2019). Applied Cryptography in .NET and Azure Key Vault: a Practical Guide to Encryption in .NET and .NET Core . Apress.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Haunts, Stephen. 2019. Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core. New York: Apress.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Haunts, Stephen. Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core New York: Apress, 2019.

Harvard Citation (style guide)

Haunts, S. (2019). Applied cryptography in .NET and azure key vault: a practical guide to encryption in .NET and .NET core. New York: Apress.

MLA Citation, 9th Edition (style guide)

Haunts, Stephen. Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core Apress, 2019.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
d7c5fb34-e673-319d-cbde-5b42842f5aec-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work IDd7c5fb34-e673-319d-cbde-5b42842f5aec-eng
Full titleapplied cryptography in net and azure key vault a practical guide to encryption in net and net core
Authorhaunts stephen
Grouping Categorybook
Last Update2025-02-05 03:31:38AM
Last Indexed2025-05-22 03:40:32AM

Book Cover Information

Image Sourcesyndetics
First LoadedOct 5, 2024
Last UsedMar 28, 2025

Marc Record

First DetectedMar 21, 2023 12:08:23 PM
Last File Modification TimeDec 17, 2024 08:08:53 AM
SuppressedRecord had no items

MARC Record

LEADER08099cam a2200721 i 4500
001on1085493255
003OCoLC
00520241217080607.0
006m     o  d        
007cr cnu|||unuuu
008190212s2019    nyu     ob    001 0 eng d
015 |a GBB935344|2 bnb
0167 |a 019254720|2 Uk
019 |a 1085699117|a 1086270412|a 1087126947|a 1091245744|a 1091253829|a 1091373910|a 1103266991|a 1105190161|a 1122814976|a 1125903956|a 1136361619|a 1156363557|a 1162162157|a 1162712173
020 |a 9781484243756|q (electronic bk.)
020 |a 1484243757|q (electronic bk.)
020 |a 9781484243763|q (print)
020 |a 1484243765
0247 |a 10.1007/978-1-4842-4375-6|2 doi
0248 |a 10.1007/978-1-4842-4
035 |a (OCoLC)1085493255|z (OCoLC)1085699117|z (OCoLC)1086270412|z (OCoLC)1087126947|z (OCoLC)1091245744|z (OCoLC)1091253829|z (OCoLC)1091373910|z (OCoLC)1103266991|z (OCoLC)1105190161|z (OCoLC)1122814976|z (OCoLC)1125903956|z (OCoLC)1136361619|z (OCoLC)1156363557|z (OCoLC)1162162157|z (OCoLC)1162712173
037 |a com.springer.onix.9781484243756|b Springer Nature
040 |a N$T|b eng|e rda|e pn|c N$T|d N$T|d EBLCP|d YDX|d GW5XE|d OCLCF|d TXM|d UKMGB|d UPM|d VT2|d UMI|d LQU|d OCLCQ|d OCLCO|d UKAHL|d COO|d LEATE|d OCLCQ|d SRU|d OCLCQ|d OCLCO|d COM|d OCLCQ|d OCLCO|d OCLCL|d HOPLA
049 |a MAIN
050 4|a QA268
072 7|a SCI|x 064000|2 bisacsh
072 7|a TEC|x 029000|2 bisacsh
072 7|a UMP|2 bicssc
072 7|a UMP|2 thema
08204|a 003.54|2 23
1001 |a Haunts, Stephen,|e author.
24510|a Applied Cryptography in .NET and Azure Key Vault :|b a Practical Guide to Encryption in .NET and .NET Core /|c Stephen Haunts ; foreword by Troy Hunt.
264 1|a New York :|b Apress,|c [2019]
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
347 |a text file
347 |b PDF
504 |a Includes bibliographical references and index.
5050 |a Intro; Table of Contents; About the Author; About the Technical Reviewer; Foreword; Introduction; Chapter 1: What Are Data Breaches?; Types of Data in a Breach and Their Consequences; The Impact on a Company; Financial Loss; Legal Action; Regulatory Impact; Loss of Reputation; Why Network Protection Isn't Enough; How Can Developers Help?; What Can You Expect from This Book?; What You Will Learn; .NET Standard and .NET Core; Code Samples in This Book; Chapter 2: A Brief History of Cryptography; Ancient Times; Increasing Cipher Complexity; Enigma and Mechanical Ciphers; Modern Cryptography
5058 |a Symmetric EncryptionPublic and Private Key Cryptography; Why Is Cryptography Important?; Examples of Modern Cryptography; The Four Pillars of Modern Cryptography; Confidentiality; Integrity; Authentication; Non-Repudiation; Summary; Chapter 3: The Importance of Random Numbers; Generating Deterministic Random Numbers; Generating Secure Random Numbers; Summary; Chapter 4: Hashing and Hashed Message Authentication Codes; Hashing and Integrity; MD5; Secure Hash Algorithm (SHA) Family; Authenticated Hashing; Summary; Chapter 5: Safely Storing Passwords; Storing Passwords in the Clear
5058 |a Encrypting PasswordsUsing Hashes to Store Passwords; Using Password Based Key Derivation Functions; Summary; Chapter 6: Symmetric Encryption; Symmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; History of DES and Triple DES; How DES and Triple DES Works; History of AES; How AES Works; How Secure Is AES Against Brute-Force Attacks?; API Commonality in the .NET Framework; Encryption Mode; Padding; Key; Initialization Vector (IV); AesManaged and AesCryptoServiceProvider
5058 |a Performing Symmetric Encryption with .NETSummary; Chapter 7: Asymmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; What Is Asymmetric Encryption?; The History of RSA; How Does RSA Work?; Key Derivation; Encryption and Decryption; RSA in .NET; In-Memory Keys; XML-Based Keys; Cryptographic Service Provider; Encryption and Decryption; Summary; Chapter 8: Digital Signatures; High-Level Look at Digital Signatures; Digital Signatures in .NET; Summary; Chapter 9: Hybrid Encryption
5058 |a Combining Symmetric and AsymmetricAdding Integrity Checks; Securely Comparing Byte Arrays; Extending with Digital Signatures; Summary; Chapter 10: Key Storage and Azure Key Vault; Exploring Key Management Options; Introducing Azure Key Vault; Azure Key Vault Hardware Mode; Azure Key Vault Software Mode; Keys vs. Secrets; Azure Key Vault Example Costs; Setting up Azure Key Vault; Creating a Key Vault; Registering Your Application with Azure Active Directory; Authorize Your Application to Use Keys and Secrets; Manually Creating Keys and Secrets; Add a Software Protected Key
520 |a Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects. What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed. Stephen Haunts is a software developer with experience across industry verticals, including game development, financial services, insurance, and healthcare. He specializes in security and cryptography and regularly speaks and presents at conferences and user groups about secure coding in .NET.
5880 |a Online resource; title from PDF title page (EBSCO, viewed February 14, 2019).
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
63000|a Windows Azure.
63007|a Windows Azure|2 fast
650 0|a Cloud computing|x Security measures.
650 0|a Coding theory.|9 33717
650 0|a Cryptography.|9 35279
758 |i has work:|a Applied cryptography in .NET and Azure Key Vault (Text)|1 https://id.oclc.org/worldcat/entity/E39PCH74mb4f9QBrFdGHCrG6qP|4 https://id.oclc.org/worldcat/ontology/hasWork
77608|i Print version:|a Haunts, Stephen.|t Applied Cryptography in .NET and Azure Key Vault.|d New York : Apress, [2019]|z 1484243749|z 9781484243749|w (OCoLC)1077492335
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781484243756/?ar|x O'Reilly|z eBook
938 |a hoopla Digital|b HOPL|n MWT15148808
938 |a Askews and Holts Library Services|b ASKH|n AH35965401
938 |a ProQuest Ebook Central|b EBLB|n EBL5695671
938 |a EBSCOhost|b EBSC|n 2026494
938 |a YBP Library Services|b YANK|n 16044112
994 |a 92|b VIA
999 |c 287946|d 287946