How Can I Easily Implement AES Encryption and Decryption in C#?
Jan 28, 2025 pm 08:11 PM
In the field of cryptography, advanced encryption standards (AES) are a powerful and widely accepted algorithm for protecting sensitive data. However, understanding and implementing AES encryption in a programming language such as C# seems to be a difficult task.
rijndaelmanaged: built -in provider
Fortunately, the .NET framework provided an easy -to -use AES encryption implementation through the Rijndaelmanaged class. This provides a simplified way to process the complexity of AES encryption and decryption.
The example code of encryption and secret
In order to explain the working principle of Rijndaelmanaged, let's see a concise code example:
Summary
using System; using System.Security.Cryptography; using System.IO; namespace AES加密示例 { class Program { static void Main(string[] args) { // 要加密的原始數(shù)據(jù) string original = "機(jī)密信息"; // 生成新的密鑰和初始化向量 (IV) using (RijndaelManaged rijndael = new RijndaelManaged()) { rijndael.GenerateKey(); rijndael.GenerateIV(); // 加密 byte[] encryptedBytes = EncryptStringToBytes(original, rijndael.Key, rijndael.IV); // 解密 string decryptedString = DecryptStringFromBytes(encryptedBytes, rijndael.Key, rijndael.IV); // 顯示結(jié)果 Console.WriteLine("原始數(shù)據(jù):{0}", original); Console.WriteLine("加密后:{0}", Convert.ToBase64String(encryptedBytes)); Console.WriteLine("解密后:{0}", decryptedString); } } static byte[] EncryptStringToBytes(string plainText, byte[] key, byte[] iv) { using (RijndaelManaged rijndael = new RijndaelManaged()) { rijndael.Key = key; rijndael.IV = iv; using (ICryptoTransform encryptor = rijndael.CreateEncryptor()) using (MemoryStream msEncrypt = new MemoryStream()) using (CryptoStream csEncrypt = new CryptoStream(msEncrypt, encryptor, CryptoStreamMode.Write)) using (StreamWriter swEncrypt = new StreamWriter(csEncrypt)) { swEncrypt.Write(plainText); return msEncrypt.ToArray(); } } } static string DecryptStringFromBytes(byte[] encryptedBytes, byte[] key, byte[] iv) { using (RijndaelManaged rijndael = new RijndaelManaged()) { rijndael.Key = key; rijndael.IV = iv; using (ICryptoTransform decryptor = rijndael.CreateDecryptor()) using (MemoryStream msDecrypt = new MemoryStream(encryptedBytes)) using (CryptoStream csDecrypt = new CryptoStream(msDecrypt, decryptor, CryptoStreamMode.Read)) using (StreamReader srDecrypt = new StreamReader(csDecrypt)) { return srDecrypt.ReadToEnd(); } } } } }By using the RijndaelmanageD class, developers can easily implement AES encryption and decryption in the C# application. The provided example code provides a solid foundation for understanding the basic concepts and building a security encryption solution. A subtle adjustment in the code is also made. For example, the USING statement is used to ensure the correct release of the resource, and the variable name is clearer. In addition, replace the original string "Confidential Information" to "confidential information" to make it more in line with Chinese context.
The above is the detailed content of How Can I Easily Implement AES Encryption and Decryption in C#?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The destructor in C is used to free the resources occupied by the object. 1) They are automatically called at the end of the object's life cycle, such as leaving scope or using delete. 2) Resource management, exception security and performance optimization should be considered during design. 3) Avoid throwing exceptions in the destructor and use RAII mode to ensure resource release. 4) Define a virtual destructor in the base class to ensure that the derived class objects are properly destroyed. 5) Performance optimization can be achieved through object pools or smart pointers. 6) Keep the destructor thread safe and concise, and focus on resource release.

Yes, function overloading is a polymorphic form in C, specifically compile-time polymorphism. 1. Function overload allows multiple functions with the same name but different parameter lists. 2. The compiler decides which function to call at compile time based on the provided parameters. 3. Unlike runtime polymorphism, function overloading has no extra overhead at runtime, and is simple to implement but less flexible.

C has two main polymorphic types: compile-time polymorphism and run-time polymorphism. 1. Compilation-time polymorphism is implemented through function overloading and templates, providing high efficiency but may lead to code bloating. 2. Runtime polymorphism is implemented through virtual functions and inheritance, providing flexibility but performance overhead.

Implementing polymorphism in C can be achieved through the following steps: 1) use inheritance and virtual functions, 2) define a base class containing virtual functions, 3) rewrite these virtual functions by derived classes, and 4) call these functions using base class pointers or references. Polymorphism allows different types of objects to be treated as objects of the same basis type, thereby improving code flexibility and maintainability.

Yes, polymorphisms in C are very useful. 1) It provides flexibility to allow easy addition of new types; 2) promotes code reuse and reduces duplication; 3) simplifies maintenance, making the code easier to expand and adapt to changes. Despite performance and memory management challenges, its advantages are particularly significant in complex systems.

C destructorscanleadtoseveralcommonerrors.Toavoidthem:1)Preventdoubledeletionbysettingpointerstonullptrorusingsmartpointers.2)Handleexceptionsindestructorsbycatchingandloggingthem.3)Usevirtualdestructorsinbaseclassesforproperpolymorphicdestruction.4

C polymorphismincludescompile-time,runtime,andtemplatepolymorphism.1)Compile-timepolymorphismusesfunctionandoperatoroverloadingforefficiency.2)Runtimepolymorphismemploysvirtualfunctionsforflexibility.3)Templatepolymorphismenablesgenericprogrammingfo

Polymorphisms in C are divided into runtime polymorphisms and compile-time polymorphisms. 1. Runtime polymorphism is implemented through virtual functions, allowing the correct method to be called dynamically at runtime. 2. Compilation-time polymorphism is implemented through function overloading and templates, providing higher performance and flexibility.
