Hashing and Hashed Message Authentication Codes

  • Stephen Haunts


Now that you know the importance of random numbers in cryptography and how to generate them, let’s look at one of the pillars of cryptography. In Chapter  2, I mentioned the four pillars of modern cryptography: cryptography, integrity, authentication, and non-repudiation. In this chapter, we explore integrity and authentication by looking at the various hashing and authenticated hashing operations available in .NET.

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations