Illustrates decrypting a file : File Cryptography « File Stream « C# / C Sharp

Home
C# / C Sharp
1.2D Graphics
2.Class Interface
3.Collections Data Structure
4.Components
5.Data Types
6.Database ADO.net
7.Design Patterns
8.Development Class
9.Event
10.File Stream
11.Generics
12.GUI Windows Form
13.Language Basics
14.LINQ
15.Network
16.Office
17.Reflection
18.Regular Expressions
19.Security
20.Services Event
21.Thread
22.Web Services
23.Windows
24.Windows Presentation Foundation
25.XML
26.XML LINQ
C# / C Sharp by API
C# / CSharp Tutorial
C# / CSharp Open Source
C# / C Sharp » File Stream » File CryptographyScreenshots 
Illustrates decrypting a file

/*
Mastering Visual C# .NET
by Jason Price, Mike Gunderloy

Publisher: Sybex;
ISBN: 0782129110
*/

/*
  Example19_10.cs illustrates decrypting a file
*/

using System;
using System.IO;
using System.Security.Cryptography;

public class Example19_10 
{
    public static void Main() 
    {

        // Create a new crypto provider
        TripleDESCryptoServiceProvider tdes = 
            new TripleDESCryptoServiceProvider();

        // open the file containing the key and IV
        FileStream fsKeyIn = File.OpenRead(@"c:\temp\encrypted.key");
        
        // use a BinaryReader to read formatted data from the file
        BinaryReader br = new BinaryReader(fsKeyIn);

        // read data from the file and close it
        tdes.Key = br.ReadBytes(24);
        tdes.IV = br.ReadBytes(8);

        // Open the encrypted file
        FileStream fsIn = File.OpenRead(@"c:\\temp\\encrypted.txt");

        // Create a cryptostream to decrypt from the filestream
        CryptoStream cs = new CryptoStream(fsIn, tdes.CreateDecryptor(),
            CryptoStreamMode.Read);

        // Create a StreamReader to format the input
        StreamReader sr = new StreamReader(cs);

        // And decrypt the data
        Console.WriteLine(sr.ReadToEnd());
        sr.Close();

    }

}




           
       
Related examples in the same category
1.Illustrates asymmetric cryptographyIllustrates asymmetric cryptography
2.Illustrates encrypting a file
3.Illustrates declarative role-based security
4.Illustrates demanding permissions
www.java2java.com | Contact Us
Copyright 2009 - 12 Demo Source and Support. All rights reserved.
All other trademarks are property of their respective owners.