Encryption in dot net

Page 1

Encryption in .NET 8th July 2016

Nowadays, the current position reveals the hustles and bustles where the news is stories about sites getting hacked. The number of developers working out there can’t reach the levels needed to shield the applications from getting hacked, from the awful folks.In spite of the fact that that might be valid in a few places, there’s surely no deficiency of usefulness incorporated with the .NET system to help you scramble and secure your information.The “System.Security.Cryptography” namespace has a fortune trove of usefulness that permits you to perform hashes, two­way information encryption, and a decent couple of utility situations identified with both of those subjects. In fact, with regards to encryption, there are really two altogether different things you can do. The primary situation (typically known as hashing) is the way towards taking some bit of information and giving a restricted, cryptographic mark on it. MD5 is a decent case of this, where you can take any piece of info and transform it into a 16­character signature that can never at any point be utilized to acquire the first information. For quite a while, standard hashes, for example, MD5 were the essential means by which passwords, client names, and other delicate data were kept away in numerous databases.


Nowadays, be that as it may, the numerous figures like MD5 need additional information implementing them, for example, a “salt” worth to secure them against monstrous checking databases known as ‘Rainbow Tables’. Anyhow, MD5 don’t at present have a utilization, in any case, as we’ll see in further. The second situation commonly tended to is the way toward ensuring information while it’s in travel. For web server and http correspondence, this is ordinarily taken care of naturally utilizing the safe HTTPS convention. There are, be that as it may, numerous different cases where you might need to scramble a payload; one that springs to the brain is Email. In this circumstance, the sender should have the capacity to encode the content of a message, then send that message over an open system, where the beneficiary can then unscramble that message, uncovering the first element for them to peruse. Among the usefulness accessible in the .NET security namespace, this second case is taken care of by ‘topsy­turvy open key encryption’ amongst others.

Practical Utilization ­ We’ll investigate a two­way illustration soon, however, first how about we investigate one­way MD5, can even now help with an entirely amazing assignment. As specified in the past segment, MD5 is currently generally simple for the individuals who have the way to switch back to a unique expression. This is conceivable, on the grounds that MD5 will dependably deliver the same mark for the same info regardless of how frequently you ask it. The main way you can keep this is by picking an irregular key, expression, or some other additional piece of data known ONLY to the framework this encryption is being performed on. This additional piece of data, known as a salt, then makes the information being scrambled sufficiently distinctive that the mark does not coordinate what might be delivered had the information quite recently been encoded all alone. Nonetheless, utilizing this to encode something like passwords for a minute, there is really one thing that MD5 is particularly useful for, and that is recognizing changes. How about we envision, that you have a library of corporate reports, and in a safe database someplace, you’ve taken those archives, played out an MD5 hash of the substance of said records, then spared that hash in a protected area. In the event that one of those records were then changed by an unapproved individual, it would be a significant basic procedure to circle through all of them, perusing out the substance, recalculating the hash and contrasting it with the hash you have put away. Hashes are so great at distinguishing changes like this that numerous document assurance programs and antivirus apparatuses utilize them somehow to secure records on your framework. A decent hash can recognize something as little as an individual piece being changed in a document, which likewise implies there additionally great at affirming a record you’ve downloaded, has touched base with no encryption.


The accompanying code will take a basic string and deliver a MD5 hash of that string for you: byte[] theHash; string simpleString = “Some Text The Hash”; using(MD5 md5 = MD5.Create()) { theHash = md5.ComputeHash (Encoding.ASCII.GetBytes(simpleString)); } This will deliver a hash for the content in “simpleString” as a byte exhibit, which you then can utilize something like the accompanying to transform into a hex number that you can utilize without much of a stretch. StringBuilder strBuilder = new StringBuilder(); for (int index = 0; index < theHash.Length; index++) { strBuilder.Append(data[index].ToString(“x2″)); } string hexHash = strBuilder.ToString(); This was simply utilizing a straightforward steady string; be that as it may, utilizing a document stream, or simply snatching every one of the bytes of a record into a byte exhibit is pretty much as basic. Proceeding onward, in any case, we should get more innovative, and have a brief take at the gander at how to implement the two­way encryption. Open key encryption works by having two security keys: one private, and one open. Every key can work stand out route at once; that is, either key can be utilized to Encrypt or Decrypt a few information, yet NEVER both. What this implies practically speaking is that in the event that you encode the information with one key, you require the other key to decode it. In case you’re sending information, then more often than not the proposed beneficiary will make his/her open key accessible. You would then utilize this open key to scramble the information, realizing that the beneficiary can then utilize their private key to decode the information and uncover the first payload. To utilize the general population/private key encryption capacities, you initially need to create an open and private key pair. Creating an appropriate pair of records to use with RSA­based encryption is generally simple and can be accomplished with the accompanying code: private static CspParameters cspParameters; private static RSACryptoServiceProvider rsaProvider;


private static string publicKey; private static string privateKey; // See http://msdn.microsoft.com/en­us/library/ // system.security.cryptography.cspparameters. // providertype(v=vs.110).aspx for other values private const int PROV_RSA_FULL = 1; static void Main() { cspParameters = new CspParameters(); cspParameters.ProviderType = PROV_RSA_FULL; cspParameters.Flags = CspProviderFlags.NoFlags; cspParameters.KeyNumber = (int)KeyNumber.Exchange; rsaProvider = new RSACryptoServiceProvider(cspParameters); publicKey = rsaProvider.ToXmlString(false); privateKey = rsaProvider.ToXmlString(true); File.WriteAllText(@”d:\publickey.xml”, publicKey, Encoding.ASCII); File.WriteAllText(@”d:\privatekey.xml”, privateKey, Encoding.ASCII); } This will spare the general population and private keys into the XML records indicated, and afterward, you can utilize those XML documents while scrambling and unscrambling content. Obviously, the private key document should be kept away, a long way from prying eyes. Since the crypto supplier produces standard strings, you can without much of a stretch store the strings anyplace you, please. I just popped them into XML documents for comfort; it’s dependent upon you where you conceal them. Once you’ve created some keys, it’s anything but difficult to utilize them to scramble some content, as the accompanying code appears: private static CspParameters cspParameters; private static RSACryptoServiceProvider rsaProvider; private static string publicKey; private static string privateKey; private static byte[] unencryptedFile; private static byte[] encryptedFile; private const int PROV_RSA_FULL = 1; static void Main() {


cspParameters = new CspParameters(); cspParameters.ProviderType = PROV_RSA_FULL; cspParameters.Flags = CspProviderFlags.NoFlags; cspParameters.KeyNumber = (int)KeyNumber.Exchange; rsaProvider = new RSACryptoServiceProvider(cspParameters); publicKey = File.ReadAllText(@”d:\publickey.xml”); rsaProvider.FromXmlString(publicKey); unencryptedFile = Encoding.ASCII.GetBytes(“This is some text for me to encrypt, it can’t be too long.”); encryptedFile = rsaProvider.Encrypt(unencryptedFile, true); File.WriteAllBytes(@”d:\encryptedtest.bin”, encryptedFile); } One thing you must be watchful of, however, is that you can see the content being scrambled is not long. RSA, due to the way it works, has a length confinement. This length limitation changes relying upon what number of bits you indicate for the key, something which is not performed here. You may ponder internally, what great is the API then, on the off chance that the payloads can’t encode extensively. All things considered, you can, and there are a few, (for example, the Diffie­Hellman calculation) that permit you to do as such. The fundamental reason with the two­way open/private key encryption schedules is to permit secure transport of a little bit of data, for example, a solitary symmetric secret key or key expression, one that is to be kept secure just until the other party gets it. By then, both sides would then keep this one key a mystery between them both to deal with bigger volumes of information. Until further notice, be that as it may, we should complete this post off by taking a gander at the code that would be utilized to decode the string we beforehand scrambled. private static CspParameters cspParameters; private static RSACryptoServiceProvider rsaProvider; private static string publicKey; private static string privateKey; private static byte[] unencryptedFile; private static byte[] encryptedFile; private const int PROV_RSA_FULL = 1; static void Main()


{ cspParameters = new CspParameters(); cspParameters.ProviderType = PROV_RSA_FULL; cspParameters.Flags = CspProviderFlags.NoFlags; cspParameters.KeyNumber = (int)KeyNumber.Exchange; rsaProvider = new RSACryptoServiceProvider(cspParameters); privateKey = File.ReadAllText(@”d:\privatekey.xml”); rsaProvider.FromXmlString(privateKey); encryptedFile = File.ReadAllBytes(@”d:\encryptedtest.bin”); string unencryptedFileString = Encoding.ASCII.GetString(rsaProvider.Decrypt (encryptedFile, true)); } For the time being, however, this will encode/unscramble little measures of information. There’s very preventing you from perusing a document in little, known­size lumps and utilizing this to scramble a whole record.

For .NET training and placement reviews, please do visit CRB Tech Reviews.

Related Articles: .Net 4.6.2 Brings Security and WPF Top 8 .Net Implementing Form Based Security


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.