When protecting data in modern software, encryption becomes an essential tool. Implementing encryption in C# enables you to secure sensitive information, making it unreadable without the proper key. Whether you're encrypting passwords, files, or communication streams, C# offers powerful libraries to get the job done efficiently. Let’s break down how encryption works in C#, complete with practical examples.
What Is Encryption in C#?
Encryption is a method of converting plain text into unreadable code, ensuring your data is protected from unauthorized access. C# provides robust frameworks like the System.Security.Cryptography
namespace, offering algorithms such as RSA, AES, and DES.
But why encrypt? Picture sending a locked box via courier—only someone with the matching key can open it. Encryption locks your data, and only the intended recipient with the right "key" can unlock it.
For a deeper understanding, check out Symmetric vs Asymmetric Encryption: Key Differences to see the types of encryption in action.
Symmetric vs Asymmetric Encryption in C#
When implementing encryption in C#, it's essential to know these two main types:
- Symmetric Encryption: Uses a single key for both encryption and decryption. It’s fast but requires a secure key-sharing method.
- Asymmetric Encryption: Employs a pair of keys—a public key for encryption and a private key for decryption. It's slower but removes the need to share a private key.
Code Examples for Encrypting and Decrypting Data
Here are some straightforward examples to help you grasp encryption concepts in C#.
1. Symmetric Encryption with AES Algorithm
The AES (Advanced Encryption Standard) is widely used due to its robustness.
using System;
using System.IO;
using System.Security.Cryptography;
using System.Text;
class SymmetricEncryptionExample
{
public static void Main()
{
string original = "Sensitive data";
using (Aes aes = Aes.Create())
{
byte[] encrypted = EncryptString(original, aes.Key, aes.IV);
string decrypted = DecryptString(encrypted, aes.Key, aes.IV);
Console.WriteLine($"Original: {original}");
Console.WriteLine($"Decrypted: {decrypted}");
}
}
static byte[] EncryptString(string plainText, byte[] key, byte[] iv)
{
using (Aes aes = Aes.Create())
using (ICryptoTransform encryptor = aes.CreateEncryptor(key, iv))
using (MemoryStream ms = new MemoryStream())
using (CryptoStream cs = new CryptoStream(ms, encryptor, CryptoStreamMode.Write))
{
byte[] plainBytes = Encoding.UTF8.GetBytes(plainText);
cs.Write(plainBytes, 0, plainBytes.Length);
cs.FlushFinalBlock();
return ms.ToArray();
}
}
static string DecryptString(byte[] cipherText, byte[] key, byte[] iv)
{
using (Aes aes = Aes.Create())
using (ICryptoTransform decryptor = aes.CreateDecryptor(key, iv))
using (MemoryStream ms = new MemoryStream(cipherText))
using (CryptoStream cs = new CryptoStream(ms, decryptor, CryptoStreamMode.Read))
{
byte[] plainBytes = new byte[cipherText.Length];
int decryptedBytes = cs.Read(plainBytes, 0, plainBytes.Length);
return Encoding.UTF8.GetString(plainBytes, 0, decryptedBytes);
}
}
}
In the above code:
- AES is used for encrypting and decrypting.
- Keys and Initialization Vectors (IV) ensure your encryption is secure.
- Outputs demonstrate how data flows through encryption and decryption.
2. Asymmetric Encryption with RSA Algorithm
RSA uses a public-private key system for encryption.
using System;
using System.Security.Cryptography;
class AsymmetricEncryptionExample
{
public static void Main()
{
string data = "Critical information";
using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider())
{
string publicKey = rsa.ToXmlString(false);
string privateKey = rsa.ToXmlString(true);
byte[] encryptedData = EncryptData(data, publicKey);
string decryptedData = DecryptData(encryptedData, privateKey);
Console.WriteLine($"Original: {data}");
Console.WriteLine($"Decrypted: {decryptedData}");
}
}
static byte[] EncryptData(string data, string publicKey)
{
using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider())
{
rsa.FromXmlString(publicKey);
return rsa.Encrypt(System.Text.Encoding.UTF8.GetBytes(data), false);
}
}
static string DecryptData(byte[] data, string privateKey)
{
using (RSACryptoServiceProvider rsa = new RSACryptoServiceProvider())
{
rsa.FromXmlString(privateKey);
return System.Text.Encoding.UTF8.GetString(rsa.Decrypt(data, false));
}
}
}
3. Encrypting Files in C#
To secure files, use FileStream
alongside encryption libraries.
using System;
using System.IO;
using System.Security.Cryptography;
class FileEncryptionExample
{
public static void Main()
{
string filePath = "data.txt";
string encryptedFilePath = "data_encrypted.aes";
using (Aes aes = Aes.Create())
{
EncryptFile(filePath, encryptedFilePath, aes.Key, aes.IV);
Console.WriteLine("File encrypted successfully.");
}
}
static void EncryptFile(string inputFile, string outputFile, byte[] key, byte[] iv)
{
using (FileStream fsInput = new FileStream(inputFile, FileMode.Open))
using (FileStream fsOutput = new FileStream(outputFile, FileMode.Create))
using (Aes aes = Aes.Create())
using (CryptoStream cryptoStream = new CryptoStream(fsOutput, aes.CreateEncryptor(key, iv), CryptoStreamMode.Write))
{
fsInput.CopyTo(cryptoStream);
}
}
}
4. Hashing Passwords with SHA-256
For password verification, hashing is safer than encryption.
using System;
using System.Security.Cryptography;
using System.Text;
class HashingExample
{
public static void Main()
{
string password = "SecurePa$$word";
string hashedPassword = HashPassword(password);
Console.WriteLine($"Hashed Password: {hashedPassword}");
}
static string HashPassword(string password)
{
using (SHA256 sha256 = SHA256.Create())
{
byte[] hashBytes = sha256.ComputeHash(Encoding.UTF8.GetBytes(password));
return BitConverter.ToString(hashBytes).Replace("-", "").ToLower();
}
}
}
Conclusion
Encryption in C# is straightforward thanks to rich libraries and tools. By leveraging algorithms like AES, RSA, or hashing techniques, you can build secure applications. Always use established methods to handle sensitive data and review your code for vulnerabilities.
For more insights into C# programming, explore C# Properties: A Comprehensive Guide. This guide will deepen your understanding of controlling and managing data securely in your applications.