Skip to content

Commit f3750e0

Browse files
committed
update links to moved docs
1 parent 37d85f7 commit f3750e0

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

uwp/security/index.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,9 @@ The cryptography section contains information on more complex, cryptographic rel
3939

4040
| Topic | Description |
4141
|-------|-------------|
42-
| [Intro to certificates](certificates.md) | This article discusses the use of certificates in apps. Digital certificates are used in public key cryptography to bind a public key to a person, computer, or organization. The bound identities are most often used to authenticate one entity to another. For example, certificates are often used to authenticate a web server to a user and a user to a web server. You can create certificate requests and install or import issued certificates. You can also enroll a certificate in a certificate hierarchy. |
43-
| [Cryptographic keys](cryptographic-keys.md) | This article shows how to use standard key derivation functions to derive keys and how to encrypt content using symmetric and asymmetric keys. |
44-
| [Data protection](data-protection.md) | This article explains how to use the [DataProtectionProvider](/uwp/api/Windows.Security.Cryptography.DataProtection.DataProtectionProvider) class in the [Windows.Security.Cryptography.DataProtection](/uwp/api/Windows.Security.Cryptography.DataProtection) namespace to encrypt and decrypt digital data in a UWP app. |
45-
| [MACs, hashes, and signatures](macs-hashes-and-signatures.md) | This article discusses how message authentication codes (MACs), hashes, and signatures can be used in apps to detect message tampering. |
46-
| [Export restrictions on cryptography](export-restrictions-on-cryptography.md) | Use this info to determine if your app uses cryptography in a way that might prevent it from being listed in the Microsoft Store. |
47-
| [Common cryptography tasks](common-cryptography-tasks.md) | These articles provide example code for common cryptography tasks, such as creating random numbers, comparing buffers, converting between strings and binary data, copying to and from byte arrays, and encoding and decoding data. |
42+
| [Intro to certificates](/windows/apps/develop/security/certificates) | This article discusses the use of certificates in apps. Digital certificates are used in public key cryptography to bind a public key to a person, computer, or organization. The bound identities are most often used to authenticate one entity to another. For example, certificates are often used to authenticate a web server to a user and a user to a web server. You can create certificate requests and install or import issued certificates. You can also enroll a certificate in a certificate hierarchy. |
43+
| [Cryptographic keys](/windows/apps/develop/security/cryptographic-keys) | This article shows how to use standard key derivation functions to derive keys and how to encrypt content using symmetric and asymmetric keys. |
44+
| [Data protection](/windows/apps/develop/security/data-protection) | This article explains how to use the [DataProtectionProvider](/uwp/api/Windows.Security.Cryptography.DataProtection.DataProtectionProvider) class in the [Windows.Security.Cryptography.DataProtection](/uwp/api/Windows.Security.Cryptography.DataProtection) namespace to encrypt and decrypt digital data in a UWP app. |
45+
| [MACs, hashes, and signatures](/windows/apps/develop/security/macs-hashes-signatures) | This article discusses how message authentication codes (MACs), hashes, and signatures can be used in apps to detect message tampering. |
46+
| [Export restrictions on cryptography](/windows/apps/develop/security/export-restrictions-cryptography) | Use this info to determine if your app uses cryptography in a way that might prevent it from being listed in the Microsoft Store. |
47+
| [Common cryptography tasks](/windows/apps/develop/security/common-cryptography-tasks) | These articles provide example code for common cryptography tasks, such as creating random numbers, comparing buffers, converting between strings and binary data, copying to and from byte arrays, and encoding and decoding data. |

0 commit comments

Comments
 (0)