O'Reilly logo

.NET Framework Security by Kevin T. Price, Rudi Martin, Matthew Lyons, Sebastian Lange, Brian A. LaMacchia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Working with Strong Names

We have previously discussed strong names and their uses (see Chapter 9, “Understanding the Concepts of Strong Naming Assembles”), and now it's time to look at the nitty-gritty details of actually applying them to your project. There are several aspects to this:

  • Creation of a public/private key pair

  • Adding the strong name to your assemblies

  • Optionally full signing or re-signing assemblies during the latter stages of building/creating setup kits

  • Managing keys within your development environment

We'll cover these topics in detail in the following sections.

Strong Name Key Pair Generation

Strong names are based on the use of a public/private key pair. The public key provides a well known identity (roughly corresponding to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required