O'Reilly logo

.NET Framework Security by Kevin T. Price, Rudi Martin, Matthew Lyons, Sebastian Lange, Brian A. LaMacchia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Cryptographic Hash Functions

We turn our attention now to the portion of the .NET Framework object model that represents cryptographic hash functions. Cryptographic hash functions are represented by the HashAlgorithm class and its descendants. In this section, we describe the hash algorithms that are included in the .NET Framework class library, how to create a HashAlgorithm object corresponding to the algorithm you desire, and how to compute hashes using these objects over static and streaming data.

Creating HashAlgorithm Objects

The .NET Framework includes “in-the-box” support for the hash algorithms commonly used today in cryptographic protocols. Table 30.3 lists the hash algorithms that are supported in the .NET Framework class libraries, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required