You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: uwp/security/index.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,9 +39,9 @@ The cryptography section contains information on more complex, cryptographic rel
39
39
40
40
| Topic | Description |
41
41
|-------|-------------|
42
-
|[Intro to certificates](certificates.md)| This article discusses the use of certificates in apps. Digital certificates are used in public key cryptography to bind a public key to a person, computer, or organization. The bound identities are most often used to authenticate one entity to another. For example, certificates are often used to authenticate a web server to a user and a user to a web server. You can create certificate requests and install or import issued certificates. You can also enroll a certificate in a certificate hierarchy. |
43
-
|[Cryptographic keys](cryptographic-keys.md)| This article shows how to use standard key derivation functions to derive keys and how to encrypt content using symmetric and asymmetric keys. |
44
-
|[Data protection](data-protection.md)| This article explains how to use the [DataProtectionProvider](/uwp/api/Windows.Security.Cryptography.DataProtection.DataProtectionProvider) class in the [Windows.Security.Cryptography.DataProtection](/uwp/api/Windows.Security.Cryptography.DataProtection) namespace to encrypt and decrypt digital data in a UWP app. |
45
-
|[MACs, hashes, and signatures](macs-hashes-and-signatures.md)| This article discusses how message authentication codes (MACs), hashes, and signatures can be used in apps to detect message tampering. |
46
-
|[Export restrictions on cryptography](export-restrictions-on-cryptography.md)| Use this info to determine if your app uses cryptography in a way that might prevent it from being listed in the Microsoft Store. |
47
-
|[Common cryptography tasks](common-cryptography-tasks.md)| These articles provide example code for common cryptography tasks, such as creating random numbers, comparing buffers, converting between strings and binary data, copying to and from byte arrays, and encoding and decoding data. |
42
+
|[Intro to certificates](/windows/apps/develop/security/certificates)| This article discusses the use of certificates in apps. Digital certificates are used in public key cryptography to bind a public key to a person, computer, or organization. The bound identities are most often used to authenticate one entity to another. For example, certificates are often used to authenticate a web server to a user and a user to a web server. You can create certificate requests and install or import issued certificates. You can also enroll a certificate in a certificate hierarchy. |
43
+
|[Cryptographic keys](/windows/apps/develop/security/cryptographic-keys)| This article shows how to use standard key derivation functions to derive keys and how to encrypt content using symmetric and asymmetric keys. |
44
+
|[Data protection](/windows/apps/develop/security/data-protection)| This article explains how to use the [DataProtectionProvider](/uwp/api/Windows.Security.Cryptography.DataProtection.DataProtectionProvider) class in the [Windows.Security.Cryptography.DataProtection](/uwp/api/Windows.Security.Cryptography.DataProtection) namespace to encrypt and decrypt digital data in a UWP app. |
45
+
|[MACs, hashes, and signatures](/windows/apps/develop/security/macs-hashes-signatures)| This article discusses how message authentication codes (MACs), hashes, and signatures can be used in apps to detect message tampering. |
46
+
|[Export restrictions on cryptography](/windows/apps/develop/security/export-restrictions-cryptography)| Use this info to determine if your app uses cryptography in a way that might prevent it from being listed in the Microsoft Store. |
47
+
|[Common cryptography tasks](/windows/apps/develop/security/common-cryptography-tasks)| These articles provide example code for common cryptography tasks, such as creating random numbers, comparing buffers, converting between strings and binary data, copying to and from byte arrays, and encoding and decoding data. |
0 commit comments