Using Cryptography in your Applications
The Microsoft Cryptographic Application Program Interface (CryptoAPI)
specifies functions in a number of different areas:
These functions are used by applications to connect to a CSP. These functions
enable applications to choose a specific CSP by name, or get one with a needed
class of functionality. (See
Interfacing with a Cryptographic Service Provider (CSP) and
Service Provider Functions Summary.)
These functions allow applications to generate and customize cryptographic
keys. Full support is included for changing chaining modes, initialization
vectors, and other encryption features. (See
Generating Cryptographic Keys and
Key Generation Functions Summary.)
These functions allow applications to exchange or transmit keys. These
functions can also be used to implement fully authenticated three-leg key exchange.
(See
Exchanging Cryptographic Keys and
Key Exchange Functions Summary.)
- Data Encryption Functions
These functions allow applications to encrypt or decrypt data. Support is also
included for simultaneously encrypting and hashing data. (See
Encrypting and Decrypting Data and
Data Encryption Functions Summary.)
- Hashing and Signature Functions
These functions allow applications to compute cryptographically secure digests
of data and also enable digital signing of data. (See
Hashes and Digital Signatures and
Hashing and Digital Signature Functions Summary.)
- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers
- More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
- Databases for Amazon shops developers
-
Amazon Categories Database
Browse Nodes Database