Skip to content

Example of verifying cryptographically signed and encrypted machine files using C#, NSec, Bouncy Castle, Ed25519 and AES-256-GCM.

License

Notifications You must be signed in to change notification settings

ABouveron/example-csharp-cryptographic-machine-files

 
 

Repository files navigation

Example C# Cryptographic Machine Files

This is an example of how to verify and decrypt cryptographic machine files in C# and .NET, using Ed25519 and AES-256-GCM.

Running the example

First, install dependencies with dotnet:

dotnet restore

Then run the program:

dotnet run

You should see log output indicating the current machine file is valid as well as its decrypted contents:

Machine file is valid! Decrypting...
Machine file was successfully decrypted!
Decrypted: ...

Questions?

Reach out at support@keygen.sh if you have any questions or concerns!

About

Example of verifying cryptographically signed and encrypted machine files using C#, NSec, Bouncy Castle, Ed25519 and AES-256-GCM.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 100.0%