Solved

Rijndael implementation C#

Posted on 2008-10-19
9
2,467 Views
Last Modified: 2008-10-19
I am searching for any easy code sample of Rijndael (AES) implementation. I searched Google but found some complex examples and some ineffective samples.

Please provide me links of Rijndael implementation with examples in C#.
0
Comment
Question by:rpkhare
  • 4
  • 3
  • 2
9 Comments
 
LVL 10

Assisted Solution

by:kukno
kukno earned 60 total points
Comment Utility
0
 
LVL 8

Author Comment

by:rpkhare
Comment Utility
kukno:

Is Bouncy Castle API free?
0
 
LVL 10

Expert Comment

by:kukno
Comment Utility
0
 
LVL 55

Expert Comment

by:Jaime Olivares
Comment Utility
if you are working with .net 3.5, then you can use the AesManaged class (System.Security.Cryptography namespace)
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 8

Author Comment

by:rpkhare
Comment Utility
jaime_olivares:

Can you give links of AES Managed class?
0
 
LVL 55

Expert Comment

by:Jaime Olivares
Comment Utility
0
 
LVL 8

Author Comment

by:rpkhare
Comment Utility
But there is no example, only syntax.
0
 
LVL 55

Expert Comment

by:Jaime Olivares
Comment Utility
here is an example of RijndaelManaged, almost the same as AesManaged:
http://olondono.blogspot.com/2008/01/encrypting-and-decrypting-data.html
0
 
LVL 55

Accepted Solution

by:
Jaime Olivares earned 65 total points
Comment Utility
This example uses AesManaged:
http://silverlight.net/forums/p/14449/49982.aspx
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

A long time ago (May 2011), I have written an article showing you how to create a DLL using Visual Studio 2005 to be hosted in SQL Server 2005. That was valid at that time and it is still valid if you are still using these versions. You can still re…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now