Book Image

C# 7.1 and .NET Core 2.0 ??? Modern Cross-Platform Development - Third Edition

By : Mark J. Price
Book Image

C# 7.1 and .NET Core 2.0 ??? Modern Cross-Platform Development - Third Edition

By: Mark J. Price

Overview of this book

C# 7.1 and .NET Core 2.0 – Modern Cross-Platform Development, Third Edition, is a practical guide to creating powerful cross-platform applications with C# 7.1 and .NET Core 2.0. It gives readers of any experience level a solid foundation in C# and .NET. The first part of the book runs you through the basics of C#, as well as debugging functions and object-oriented programming, before taking a quick tour through the latest features of C# 7.1 such as default literals, tuples, inferred tuple names, pattern matching, out variables, and more. After quickly taking you through C# and how .NET works, this book dives into the .NET Standard 2.0 class libraries, covering topics such as packaging and deploying your own libraries, and using common libraries for working with collections, performance, monitoring, serialization, files, databases, and encryption. The final section of the book demonstrates the major types of application that you can build and deploy cross-device and cross-platform. In this section, you'll learn about websites, web applications, web services, Universal Windows Platform (UWP) apps, and mobile apps. By the end of the book, you'll be armed with all the knowledge you need to build modern, cross-platform applications using C# and .NET.
Table of Contents (31 chapters)
Title Page
Credits
About the Author
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
2
Part 1 – C# 7.1
8
Part 2 – .NET Core 2.0 and .NET Standard 2.0
16
Part 3 – App Models
22
Summary
Index

Encrypting and decrypting data


In .NET Core, there are multiple encryption algorithms you can choose from. Some algorithms are implemented by the operating system and their names are suffixed with CryptoServiceProvider. Some algorithms are implemented in .NET Core and their names are suffixed with Managed. Some algorithms use symmetric keys, and some use asymmetric keys.

The most common symmetric encryption algorithms are shown in the following diagram:

The most common asymmetric encryption algorithm is shown in the following diagram:

Note

Best Practice Choose Advanced Encryption Standard (AES), which is based on the Rijndael algorithm for symmetric encryption. Choose RSA for asymmetric encryption. Do not confuse RSA with DSA. Digital Signature Algorithm (DSA) cannot encrypt data. It can only generate hashes and signatures.

Encrypting symmetrically with AES

To make it easier to reuse your protection code in the future, we will create a static class named Protector in its own class library.

Symmetric...