Click here to Skip to main content
65,938 articles
CodeProject is changing. Read more.
Everything / security / cryptography

Cryptography

cryptography

Great Reads

by charles henington
Simple user defined Cipher Transform that I got the idea from https://www.codeproject.com/Articles/5319044/ARC4-Encryption-Library
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by Pavel Bashkardin
Management of cryptographic activation keys to protect your application
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

Latest Articles

by charles henington
Simple user defined Cipher Transform that I got the idea from https://www.codeproject.com/Articles/5319044/ARC4-Encryption-Library
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by Pavel Bashkardin
Management of cryptographic activation keys to protect your application
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

All Articles

Sort by Score

cryptography 

by Pavel Bashkardin
Management of cryptographic activation keys to protect your application
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.
by Pavel Bashkardin
ARC4 (Alleged RC4) Cryptography Provider Class Library
by Clark Fieseln
Low rate data exchange (e.g., chat) using audio steganography, ensuring privacy, anonymity and cybersecurity
by Florian Rappl, Niki Kilbertus
Using Microsoft Azure to add advanced machine learning capabilities with connected IoT devices, which monitor activities of a baby and his or her environment.
by CPallini
An assembly implementation of the AES-128 cipher algorithm for the 8051 microcontroller
by Dominik Reichl
A C# implementation of the BLAKE hash algorithm.
by raddevus
C’YaPass (Fully Open Source Software) now a Fully-Functioning Password Ecosystem which doesn’t store your passwords anywhere — You are the owner of your data.
by Mario Majčica
Creating the X509 based on certificate and key in PEM format
by Michael Chourdakis
Use SHA-3 and the CRYSTALS Kyber, Dilithium and Sphincs in Win32 projects
by raddevus
Fully working sample code and explanation of everything necessary to create authenticated encryption with AES256.
by Sibeesh Passion
Create own cryptocurrency and own private consortium network in Azure
by Jerome Vonk
Description of cryptographic hashes and practical examples on how to calculate them
by ASP.NET Community
At A large part of security in any web application is keeping your secrets secret.  Cryptography makes that
by Kewin Rausch
Design and development of a TOR-like protocol to keep your communication secure and your identity unknown
by raddevus
A novel approach to generate a secure way to login that doesn't require the user to ever memorize a password again. This method can be used with any web site, program, etc. and creates a more secure password than other methods.
by Michael_Jacobsen
Encryption algorithm based on key self-mutation. Complete source code and samples.
by Saira Fazal Qader
Conversion of image to byte and Encryption using 128 bit key than Decryption using the same key and re-conversion from byte to image
by raddevus
Plug this device into your computer and never type or memorize a password again. That's right, no need to memorize your Windows login (and you won't be able to because it will be so long and complex anyways).
by Bruno Tabbia
Creation of a substitution box starting from a key and using it in a direct substitution cipher
by Dharmesh_Kemkar
Basics on Cryptography, SSL and Digital Signature
by Sergey Alexandrovich Kryukov
Generator of highly secure passwords based on cryptographic hash and master password, which should be memorized; no password storage is involved.
by Raphael Amorim
How to get plain text session using CryptoAPI
by Arpan Jati
RSA encryption library with full OAEP padding and private key encryption support
by Fernando E. Braz
This is an alternative for "Secret Key Encryption Demo"
by TimMackey
A simple demonstration of public key cryptography and a character substitution encryption method.
by phil.o
C# implementation of sponge construction and SHA-3 hashing operations
by All Time Programming
Verifying the Server Certificate on the client side using a CA file
by All Time Programming
Perform SSL Verification while using Web Services
by 1337Architect
Handy classes to use the .NET Encryption/Decryption
by Michael Chourdakis
A standard-compliant library for secure signing
by Michael Haephrati
How to fetch and decrypt Wi-Fi stored credentials
by raddevus
Complete source code that creates a solution so users never have to make up, memorize or type a password again