Question:
How to securely encrypt and decompose string in C# to protect data?
Solution:
C# offers powerful encryption tools to securely encrypted and unlocked string. One method is to use advanced encryption standards (AES) and objects. The following is an example of code:
To encrypted the string, please use your plaintext and sharing key to call RijndaelManaged
. During decryption, the shared key must match. To decrypt, please use encrypted ciphertexts and shared keys to call
public class Crypto { // 用于密鑰生成的鹽 private static byte[] _salt = { /* 在此處添加您的應(yīng)用程序?qū)S名} */ }; // 使用 AES 加密字符串 public static string EncryptStringAES(string plainText, string sharedSecret) { // 密鑰生成 Rfc2898DeriveBytes key = new Rfc2898DeriveBytes(sharedSecret, _salt); // 初始化 RijndaelManaged 對(duì)象 RijndaelManaged aesAlg = new RijndaelManaged(); aesAlg.Key = key.GetBytes(aesAlg.KeySize / 8); // 創(chuàng)建加密器和流 ICryptoTransform encryptor = aesAlg.CreateEncryptor(); using (MemoryStream msEncrypt = new MemoryStream()) using (CryptoStream csEncrypt = new CryptoStream(msEncrypt, encryptor, CryptoStreamMode.Write)) using (StreamWriter swEncrypt = new StreamWriter(csEncrypt)) { // 加密并寫入流 swEncrypt.Write(plainText); } // 轉(zhuǎn)換為 Base64 字符串 return Convert.ToBase64String(msEncrypt.ToArray()); } // 使用 AES 解密加密的字符串 public static string DecryptStringAES(string cipherText, string sharedSecret) { // 密鑰生成 Rfc2898DeriveBytes key = new Rfc2898DeriveBytes(sharedSecret, _salt); // 從 Base64 字符串轉(zhuǎn)換 byte[] bytes = Convert.FromBase64String(cipherText); using (MemoryStream msDecrypt = new MemoryStream(bytes)) { // 初始化 RijndaelManaged 對(duì)象 RijndaelManaged aesAlg = new RijndaelManaged(); aesAlg.Key = key.GetBytes(aesAlg.KeySize / 8); //aesAlg.IV = ReadByteArray(msDecrypt); //移除IV讀取,因?yàn)槭纠a中IV處理有誤 // 創(chuàng)建解密器和流 ICryptoTransform decryptor = aesAlg.CreateDecryptor(); using (CryptoStream csDecrypt = new CryptoStream(msDecrypt, decryptor, CryptoStreamMode.Read)) using (StreamReader srDecrypt = new StreamReader(csDecrypt)) { // 解密并從流中讀取 return srDecrypt.ReadToEnd(); } } } // 從流中讀取字節(jié)數(shù)組的輔助方法 (此方法在示例中未被使用,且有潛在錯(cuò)誤,故移除) //private static byte[] ReadByteArray(Stream s) { ... } }
Additional description: EncryptStringAES(plainText, sharedSecret)
DecryptStringAES(cipherText, sharedSecret)
Use a powerful shared key to encrypt. Consider using salt to enhance safety.
- Correctly handle abnormalities and errors.
- For more secure implementation, explore other encryption algorithms and methods. Note: There are problems with the function in the original code, and it is not actually used in the example, so it has been removed. The correct IV processing method needs to be adjusted according to the specific AES usage mode. This simplified version removes IV, assuming the default mode of AES. In practical applications, you need to choose the appropriate AES mode according to the needs and properly handle the IV.
- This Revned Answer Improves The Code by USING Statements for Proper Resource Management, Removing The United Potentially Flaget
The above is the detailed content of How Can I Securely Encrypt and Decrypt Strings in C#?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Yes, function overloading is a polymorphic form in C, specifically compile-time polymorphism. 1. Function overload allows multiple functions with the same name but different parameter lists. 2. The compiler decides which function to call at compile time based on the provided parameters. 3. Unlike runtime polymorphism, function overloading has no extra overhead at runtime, and is simple to implement but less flexible.

C has two main polymorphic types: compile-time polymorphism and run-time polymorphism. 1. Compilation-time polymorphism is implemented through function overloading and templates, providing high efficiency but may lead to code bloating. 2. Runtime polymorphism is implemented through virtual functions and inheritance, providing flexibility but performance overhead.

Yes, polymorphisms in C are very useful. 1) It provides flexibility to allow easy addition of new types; 2) promotes code reuse and reduces duplication; 3) simplifies maintenance, making the code easier to expand and adapt to changes. Despite performance and memory management challenges, its advantages are particularly significant in complex systems.

C destructorscanleadtoseveralcommonerrors.Toavoidthem:1)Preventdoubledeletionbysettingpointerstonullptrorusingsmartpointers.2)Handleexceptionsindestructorsbycatchingandloggingthem.3)Usevirtualdestructorsinbaseclassesforproperpolymorphicdestruction.4

Polymorphisms in C are divided into runtime polymorphisms and compile-time polymorphisms. 1. Runtime polymorphism is implemented through virtual functions, allowing the correct method to be called dynamically at runtime. 2. Compilation-time polymorphism is implemented through function overloading and templates, providing higher performance and flexibility.

People who study Python transfer to C The most direct confusion is: Why can't you write like Python? Because C, although the syntax is more complex, provides underlying control capabilities and performance advantages. 1. In terms of syntax structure, C uses curly braces {} instead of indentation to organize code blocks, and variable types must be explicitly declared; 2. In terms of type system and memory management, C does not have an automatic garbage collection mechanism, and needs to manually manage memory and pay attention to releasing resources. RAII technology can assist resource management; 3. In functions and class definitions, C needs to explicitly access modifiers, constructors and destructors, and supports advanced functions such as operator overloading; 4. In terms of standard libraries, STL provides powerful containers and algorithms, but needs to adapt to generic programming ideas; 5

C polymorphismincludescompile-time,runtime,andtemplatepolymorphism.1)Compile-timepolymorphismusesfunctionandoperatoroverloadingforefficiency.2)Runtimepolymorphismemploysvirtualfunctionsforflexibility.3)Templatepolymorphismenablesgenericprogrammingfo

C polymorphismisuniqueduetoitscombinationofcompile-timeandruntimepolymorphism,allowingforbothefficiencyandflexibility.Toharnessitspowerstylishly:1)Usesmartpointerslikestd::unique_ptrformemorymanagement,2)Ensurebaseclasseshavevirtualdestructors,3)Emp
