Click here to Skip to main content
65,938 articles
CodeProject is changing. Read more.
Everything / security / encryption

Encryption

encryption

Great Reads

by Brad Joss
[RegSave] your property to the Registry, and more.
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by adriancs
Communication between Arduino and C# (ASP.NET) by using AES encrypted HTTP GET request
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

Latest Articles

by Brad Joss
[RegSave] your property to the Registry, and more.
by Marian Placko
This article shows a simple hack of a built-in MS SQL Server WITH ENCRYPTION mechanism
by adriancs
Communication between Arduino and C# (ASP.NET) by using AES encrypted HTTP GET request
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.

All Articles

Sort by Score

encryption 

by Brad Joss
[RegSave] your property to the Registry, and more.
by adriancs
Communication between Arduino and C# (ASP.NET) by using AES encrypted HTTP GET request
by Pavel Durov
This article will explain briefly how to use a basic encryption/decryption on Android and on .NET platforms, with focus on passing encrypted data from Android to .NET.
by santosh poojari
This article helps you to build and enable robust web applications with respect to various aspects of security that needs to be taken care of while designing a system.
by Clark Fieseln
Compress, encrypt and hide a secret file inside an audio file (MP3, WAV, OGG, FLAC, ..)
by Sacha Barber
Azure Service Fabric Demo + IOC, logging, encryption
by Patrick Kalkman
An assembly that adds Basic Authentication to an IIS hosted WCF REST service to validate against any back-end.
by Dominik Reichl
A C# implementation of the BLAKE hash algorithm.
by adriancs
A C# universal AES Encryption Library.
by Simon Bridge
Generating encryption keys using Cellular Automata.
by #realJSOP
One way to create a completely random encryption key, and sharing it with a client application
by raddevus
Fully working sample code and explanation of everything necessary to create authenticated encryption with AES256.
by Rick Bassham
An introduction into creating a working FTP server in C# using the RFC specification.
by Kashif.Mushtaq.Ca
Cross Platform AES 256 GCM Encryption and Decryption (C++, C# and Java)
by DataBytzAI
Overview of encryption at rest, in motion and in use with Azure Encryption
by Kuv Patel
Decrypt Stored Procedures, Views, Functions, and Triggers in SQL Server
by OriginalGriff
I've seen quite a few questions asking how to decrypt SHA and MD5 to obtain the original input, mostly related to "encrypted passwords" and I thought I'd try to explain why the answer is "you can't".
by Serge Berlin
.NET Library for in-memory GZip and LZMA compression combined with strong BlakeB based stream cipher engine
by Bruno Tabbia
Encrypt your C# classes and compile them during run-time (hiding their code in the exe file).
by Scott Clayton
Set up encrypted secure communication between C# and PHP using the AES and RSA algorithms.
by Frank T. Clark
A C# .NET 3.5 (Win7) Windows Forms Application with source code
by Dragonranger
A neat library which can be used to easily add encryption for InfoPath form data.
by Michael_Jacobsen
Encryption algorithm based on key self-mutation. Complete source code and samples.
by Avi Farah
Overcoming limitations of: Enhanced String Handling
by Darek Danielewski
With a little help from C# Extensions and Dapper, it is easy to streamline coded database interaction, even with encrypted columns
by Federico Di Marco
Fededim.Extensions.Configuration.Protected is an improved ConfigurationBuilder which allows partial or full encryption of configuration values stored inside any possible ConfigurationSource and fully integrated in the ASP.NET Core architecture.
by Bruno Tabbia
Encription algorithm that uses mandelbrot fractal to expand the encryption key
by SOHAM_GANDHI
Image cryptography using RSA algorithm in C#
by cogi83
A SW to send your WAN IP and other info via email
by Chris Copeland
Using call stacks, rather than Regular Expression, to deconstruct mathematical formulae and calculate values.
by Jose A Pascoa
This article deals with building a standalone 64-bit .NET .exe file that is statically linked with an Assembly Language compiled object file.
by RajeshKumar D
Configuring PGP Encryption and Decryption part of MULE ESB
by DataBytzAI
What is Azure Key Vault and where is it useful?
by Max R McCarty
How are you storing that sensitive application data and should you be?
by Sunasara Imdadhusen
PDF MERGER and PROTECTOR is the best pdf merger software which is fast and powerful way to join(Merge) PDF files with password protection as well as you can apply stamper with either any type of image or text. Using this utility you don’t required installation of Adobe Acrobat. Looks Exciting ???
by Mohamed Kalmoua
In this article, I will discuss a PDF password recovery tool that I created in WPF using Visual Studio 2015.
by David Rogers Dev
Encrypting and Decrypting Files with GnuPG
by Palavos
A tutorial of PL/I basic concepts based on an encryption example
by Pieter Alec Myburgh
Folder Encrypted / Decrypter with standolone function
by Corinna John
Encode a text by sorting notes.
by Michael Haephrati
A string obfuscation system that integrates in a Visual Studio C++ solution
by 1337Architect
Handy classes to use the .NET Encryption/Decryption
by Matthew Givens
Showing how to decrypt files in memory in order to maintain data security.
by jeremylei
A RESTful web service using the newest .NET platform features including automatic serialization/deserialization of complex types.
by Juergen Pott
This article demonstrates all the WPF features of binding, templating, styling, commands, etc. by a navigation example.
by Baxter P
WPF Secure Messenger
by Joe Dillon
This article describes the security techniques required to create a secure offline password manager and how the Libsodium library has been used to achieve this. YAPM stores passwords with AES encryption and authenticates users with an Argon2 hash.