?
Solved

Rijndael implementation C#

Posted on 2008-10-19
9
Medium Priority
?
2,522 Views
Last Modified: 2008-10-19
I am searching for any easy code sample of Rijndael (AES) implementation. I searched Google but found some complex examples and some ineffective samples.

Please provide me links of Rijndael implementation with examples in C#.
0
Comment
Question by:rpkhare
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
9 Comments
 
LVL 10

Assisted Solution

by:kukno
kukno earned 180 total points
ID: 22752600
0
 
LVL 8

Author Comment

by:rpkhare
ID: 22752651
kukno:

Is Bouncy Castle API free?
0
 
LVL 10

Expert Comment

by:kukno
ID: 22752700
0
Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 22752731
if you are working with .net 3.5, then you can use the AesManaged class (System.Security.Cryptography namespace)
0
 
LVL 8

Author Comment

by:rpkhare
ID: 22752743
jaime_olivares:

Can you give links of AES Managed class?
0
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 22752796
0
 
LVL 8

Author Comment

by:rpkhare
ID: 22752852
But there is no example, only syntax.
0
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 22752878
here is an example of RijndaelManaged, almost the same as AesManaged:
http://olondono.blogspot.com/2008/01/encrypting-and-decrypting-data.html
0
 
LVL 55

Accepted Solution

by:
Jaime Olivares earned 195 total points
ID: 22752885
This example uses AesManaged:
http://silverlight.net/forums/p/14449/49982.aspx
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Performance in games development is paramount: every microsecond counts to be able to do everything in less than 33ms (aiming at 16ms). C# foreach statement is one of the worst performance killers, and here I explain why.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month10 days, 4 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question