Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The following topics contain examples that show common data manipulation required during cryptographic operations. The methods shown are part of the Windows.Security.Cryptography namespace.
- Creating random numbers
- Comparing buffers
- Converting between strings and binary data
- Copying to and from byte arrays
- Encoding and decoding base64 data
- Encoding and decoding hexadecimal data