Illustrates decrypting a file : File Cryptography « File Stream « C# / C Sharp

Home
C# / C Sharp
1.2D Graphics
2.Class Interface
3.Collections Data Structure
4.Components
5.Data Types
6.Database ADO.net
7.Date Time
8.Design Patterns
9.Development Class
10.Event
11.File Stream
12.Generics
13.GUI Windows Form
14.Internationalization I18N
15.Language Basics
16.LINQ
17.Network
18.Office
19.Reflection
20.Regular Expressions
21.Security
22.Services Event
23.Thread
24.Web Services
25.Windows
26.Windows Presentation Foundation
27.XML
28.XML LINQ
C# Book
C# / C Sharp by API
C# / CSharp Tutorial
C# / CSharp Open Source
C# / C Sharp » File Stream » File CryptographyScreenshots 
Illustrates decrypting a file

/*
Mastering Visual C# .NET
by Jason Price, Mike Gunderloy

Publisher: Sybex;
ISBN: 0782129110
*/

/*
  Example19_10.cs illustrates decrypting a file
*/

using System;
using System.IO;
using System.Security.Cryptography;

public class Example19_10 
{
    public static void Main() 
    {

        // Create a new crypto provider
        TripleDESCryptoServiceProvider tdes = 
            new TripleDESCryptoServiceProvider();

        // open the file containing the key and IV
        FileStream fsKeyIn = File.OpenRead(@"c:\temp\encrypted.key");
        
        // use a BinaryReader to read formatted data from the file
        BinaryReader br = new BinaryReader(fsKeyIn);

        // read data from the file and close it
        tdes.Key = br.ReadBytes(24);
        tdes.IV = br.ReadBytes(8);

        // Open the encrypted file
        FileStream fsIn = File.OpenRead(@"c:\\temp\\encrypted.txt");

        // Create a cryptostream to decrypt from the filestream
        CryptoStream cs = new CryptoStream(fsIn, tdes.CreateDecryptor(),
            CryptoStreamMode.Read);

        // Create a StreamReader to format the input
        StreamReader sr = new StreamReader(cs);

        // And decrypt the data
        Console.WriteLine(sr.ReadToEnd());
        sr.Close();

    }

}




           
       
Related examples in the same category
1.Illustrates asymmetric cryptographyIllustrates asymmetric cryptography
2.Illustrates encrypting a file
3.Illustrates declarative role-based security
4.Illustrates demanding permissions
java2s.com  |  | Contact Us | Privacy Policy
Copyright 2009 - 12 Demo Source and Support. All rights reserved.
All other trademarks are property of their respective owners.