What are the strongest encryption/hashing functions? |
RFC2898DeriveBytes Class
Using RFC2898DeriveBytes with a non trivial iteration count should be better than using a straight hash function for authentication purposes. The Rfc2898DeriveBytes class can be used to produce a derived key from a base key and other parameters. In a password-based key derivation function, the base key is a password and the other parameters are a salt value and an iteration count. More about.......Encryption and Decryption Bang |
Messages In This Thread |
What are the strongest encryption/hashing functions? - by geekita - 03-06-2015, 02:18 PM
RE: What are the strongest encryption/hashing functions? - by Narf - 03-06-2015, 04:35 PM
RE: What are the strongest encryption/hashing functions? - by geekita - 03-07-2015, 05:37 AM
RE: What are the strongest encryption/hashing functions? - by Narf - 03-07-2015, 11:30 AM
RE: What are the strongest encryption/hashing functions? - by darrenbang - 08-13-2015, 01:17 AM
|