Community

Cryptography and .NET – Part 4 (Hash Values)

(Bipin Joshi) In previous parts of this series (Part 1, Part 2 and Part 3) we saw various techniques of encrypting the data. In this part we are going to learn how to ensure that data coming to you has not been tampered with during the transfer. The technique that we will be using is hash. Hash valu

Read More - Register for Free Membership