{"id":26844,"date":"2024-03-16T07:26:46","date_gmt":"2024-03-16T07:26:46","guid":{"rendered":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/"},"modified":"2024-03-22T09:34:43","modified_gmt":"2024-03-22T09:34:43","slug":"common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption","status":"publish","type":"post","link":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/","title":{"rendered":"Common encryption and decryption methods in C# (MD5 encryption and decryption)"},"content":{"rendered":"<p>There are many common encryption and decryption methods in C#, including the MD5 method. Here is an example of using C# for MD5 encryption and decryption:<\/p>\n<pre class=\"post-pre\"><code><span class=\"hljs-keyword\">using<\/span> System;\r\n<span class=\"hljs-keyword\">using<\/span> System.Security.Cryptography;\r\n<span class=\"hljs-keyword\">using<\/span> System.Text;\r\n\r\n<span class=\"hljs-keyword\">public<\/span> <span class=\"hljs-keyword\">class<\/span> <span class=\"hljs-title\">Program<\/span>\r\n{\r\n    <span class=\"hljs-function\"><span class=\"hljs-keyword\">public<\/span> <span class=\"hljs-keyword\">static<\/span> <span class=\"hljs-keyword\">void<\/span> <span class=\"hljs-title\">Main<\/span>()<\/span>\r\n    {\r\n        <span class=\"hljs-built_in\">string<\/span> originalText = <span class=\"hljs-string\">\"Hello World\"<\/span>;\r\n\r\n        <span class=\"hljs-comment\">\/\/ MD5\u52a0\u5bc6<\/span>\r\n        <span class=\"hljs-built_in\">string<\/span> md5Hash = MD5Hash(originalText);\r\n        Console.WriteLine(<span class=\"hljs-string\">\"MD5 Hash: \"<\/span> + md5Hash);\r\n\r\n        <span class=\"hljs-comment\">\/\/ MD5\u9a8c\u8bc1<\/span>\r\n        <span class=\"hljs-built_in\">bool<\/span> md5Verify = VerifyMD5Hash(originalText, md5Hash);\r\n        Console.WriteLine(<span class=\"hljs-string\">\"MD5 Verify: \"<\/span> + md5Verify);\r\n    }\r\n\r\n    <span class=\"hljs-comment\">\/\/ \u4f7f\u7528MD5\u52a0\u5bc6\u5b57\u7b26\u4e32<\/span>\r\n    <span class=\"hljs-function\"><span class=\"hljs-keyword\">public<\/span> <span class=\"hljs-keyword\">static<\/span> <span class=\"hljs-built_in\">string<\/span> <span class=\"hljs-title\">MD5Hash<\/span>(<span class=\"hljs-params\"><span class=\"hljs-built_in\">string<\/span> text<\/span>)<\/span>\r\n    {\r\n        <span class=\"hljs-keyword\">using<\/span> (MD5 md5 = MD5.Create())\r\n        {\r\n            <span class=\"hljs-built_in\">byte<\/span>[] inputBytes = Encoding.ASCII.GetBytes(text);\r\n            <span class=\"hljs-built_in\">byte<\/span>[] hashBytes = md5.ComputeHash(inputBytes);\r\n\r\n            StringBuilder builder = <span class=\"hljs-keyword\">new<\/span> StringBuilder();\r\n            <span class=\"hljs-keyword\">for<\/span> (<span class=\"hljs-built_in\">int<\/span> i = <span class=\"hljs-number\">0<\/span>; i &lt; hashBytes.Length; i++)\r\n            {\r\n                builder.Append(hashBytes[i].ToString(<span class=\"hljs-string\">\"x2\"<\/span>));\r\n            }\r\n            <span class=\"hljs-keyword\">return<\/span> builder.ToString();\r\n        }\r\n    }\r\n\r\n    <span class=\"hljs-comment\">\/\/ \u9a8c\u8bc1MD5\u54c8\u5e0c\u503c<\/span>\r\n    <span class=\"hljs-function\"><span class=\"hljs-keyword\">public<\/span> <span class=\"hljs-keyword\">static<\/span> <span class=\"hljs-built_in\">bool<\/span> <span class=\"hljs-title\">VerifyMD5Hash<\/span>(<span class=\"hljs-params\"><span class=\"hljs-built_in\">string<\/span> text, <span class=\"hljs-built_in\">string<\/span> hash<\/span>)<\/span>\r\n    {\r\n        <span class=\"hljs-built_in\">string<\/span> hashOfText = MD5Hash(text);\r\n\r\n        StringComparer comparer = StringComparer.OrdinalIgnoreCase;\r\n        <span class=\"hljs-keyword\">return<\/span> comparer.Compare(hashOfText, hash) == <span class=\"hljs-number\">0<\/span>;\r\n    }\r\n}\r\n<\/code><\/pre>\n<p>In the above example, the MD5Hash function encrypts the input string using the MD5 algorithm and returns the result in hexadecimal string format. The VerifyMD5Hash function is used to check if the MD5 hash value of the input string matches the provided hash value.<\/p>\n<p>Note: MD5 is a hashing algorithm that is irreversible. Therefore, the result of MD5 encryption cannot be decrypted back to the original string. MD5 is typically used to verify the integrity of data rather than encrypt sensitive information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many common encryption and decryption methods in C#, including the MD5 method. Here is an example of using C# for MD5 encryption and decryption: using System; using System.Security.Cryptography; using System.Text; public class Program { public static void Main() { string originalText = &#8220;Hello World&#8221;; \/\/ MD5\u52a0\u5bc6 string md5Hash = MD5Hash(originalText); Console.WriteLine(&#8220;MD5 Hash: &#8221; [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-26844","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.5 (Yoast SEO v21.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common encryption and decryption methods in C# (MD5 encryption and decryption) - Blog - Silicon Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common encryption and decryption methods in C# (MD5 encryption and decryption)\" \/>\n<meta property=\"og:description\" content=\"There are many common encryption and decryption methods in C#, including the MD5 method. Here is an example of using C# for MD5 encryption and decryption: using System; using System.Security.Cryptography; using System.Text; public class Program { public static void Main() { string originalText = &quot;Hello World&quot;; \/\/ MD5\u52a0\u5bc6 string md5Hash = MD5Hash(originalText); Console.WriteLine(&quot;MD5 Hash: &quot; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog - Silicon Cloud\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SiliCloudGlobal\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-16T07:26:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T09:34:43+00:00\" \/>\n<meta name=\"author\" content=\"Ava Mitchell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SiliCloudGlobal\" \/>\n<meta name=\"twitter:site\" content=\"@SiliCloudGlobal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ava Mitchell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\"},\"author\":{\"name\":\"Ava Mitchell\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64\"},\"headline\":\"Common encryption and decryption methods in C# (MD5 encryption and decryption)\",\"datePublished\":\"2024-03-16T07:26:46+00:00\",\"dateModified\":\"2024-03-22T09:34:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\"},\"wordCount\":121,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\",\"url\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\",\"name\":\"Common encryption and decryption methods in C# (MD5 encryption and decryption) - Blog - Silicon Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#website\"},\"datePublished\":\"2024-03-16T07:26:46+00:00\",\"dateModified\":\"2024-03-22T09:34:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.silicloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common encryption and decryption methods in C# (MD5 encryption and decryption)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#website\",\"url\":\"https:\/\/www.silicloud.com\/blog\/\",\"name\":\"Silicon Cloud Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#organization\",\"name\":\"Silicon Cloud Blog\",\"url\":\"https:\/\/www.silicloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png\",\"contentUrl\":\"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png\",\"width\":1024,\"height\":1024,\"caption\":\"Silicon Cloud Blog\"},\"image\":{\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SiliCloudGlobal\/\",\"https:\/\/twitter.com\/SiliCloudGlobal\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64\",\"name\":\"Ava Mitchell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g\",\"caption\":\"Ava Mitchell\"},\"url\":\"https:\/\/www.silicloud.com\/blog\/author\/avamitchell\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Common encryption and decryption methods in C# (MD5 encryption and decryption) - Blog - Silicon Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/","og_locale":"en_US","og_type":"article","og_title":"Common encryption and decryption methods in C# (MD5 encryption and decryption)","og_description":"There are many common encryption and decryption methods in C#, including the MD5 method. Here is an example of using C# for MD5 encryption and decryption: using System; using System.Security.Cryptography; using System.Text; public class Program { public static void Main() { string originalText = \"Hello World\"; \/\/ MD5\u52a0\u5bc6 string md5Hash = MD5Hash(originalText); Console.WriteLine(\"MD5 Hash: \" [&hellip;]","og_url":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/","og_site_name":"Blog - Silicon Cloud","article_publisher":"https:\/\/www.facebook.com\/SiliCloudGlobal\/","article_published_time":"2024-03-16T07:26:46+00:00","article_modified_time":"2024-03-22T09:34:43+00:00","author":"Ava Mitchell","twitter_card":"summary_large_image","twitter_creator":"@SiliCloudGlobal","twitter_site":"@SiliCloudGlobal","twitter_misc":{"Written by":"Ava Mitchell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#article","isPartOf":{"@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/"},"author":{"name":"Ava Mitchell","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64"},"headline":"Common encryption and decryption methods in C# (MD5 encryption and decryption)","datePublished":"2024-03-16T07:26:46+00:00","dateModified":"2024-03-22T09:34:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/"},"wordCount":121,"commentCount":0,"publisher":{"@id":"https:\/\/www.silicloud.com\/blog\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/","url":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/","name":"Common encryption and decryption methods in C# (MD5 encryption and decryption) - Blog - Silicon Cloud","isPartOf":{"@id":"https:\/\/www.silicloud.com\/blog\/#website"},"datePublished":"2024-03-16T07:26:46+00:00","dateModified":"2024-03-22T09:34:43+00:00","breadcrumb":{"@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.silicloud.com\/blog\/common-encryption-and-decryption-methods-in-c-md5-encryption-and-decryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.silicloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Common encryption and decryption methods in C# (MD5 encryption and decryption)"}]},{"@type":"WebSite","@id":"https:\/\/www.silicloud.com\/blog\/#website","url":"https:\/\/www.silicloud.com\/blog\/","name":"Silicon Cloud Blog","description":"","publisher":{"@id":"https:\/\/www.silicloud.com\/blog\/#organization"},"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.silicloud.com\/blog\/#organization","name":"Silicon Cloud Blog","url":"https:\/\/www.silicloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png","contentUrl":"https:\/\/www.silicloud.com\/blog\/wp-content\/uploads\/2023\/11\/EN-SILICON-Full.png","width":1024,"height":1024,"caption":"Silicon Cloud Blog"},"image":{"@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SiliCloudGlobal\/","https:\/\/twitter.com\/SiliCloudGlobal"]},{"@type":"Person","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/a3e2658c2cb9fb2be95ae0a8861f4a64","name":"Ava Mitchell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.silicloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15c63cd0564b4a2e07d611bcdffa296f6ea80e8db07c3091f43a84010514899d?s=96&d=mm&r=g","caption":"Ava Mitchell"},"url":"https:\/\/www.silicloud.com\/blog\/author\/avamitchell\/"}]}},"_links":{"self":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/26844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/comments?post=26844"}],"version-history":[{"count":1,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/26844\/revisions"}],"predecessor-version":[{"id":61036,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/posts\/26844\/revisions\/61036"}],"wp:attachment":[{"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/media?parent=26844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/categories?post=26844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.silicloud.com\/blog\/wp-json\/wp\/v2\/tags?post=26844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}