Skip to Content
.NET Framework Security
book

.NET Framework Security

by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
April 2002
Intermediate to advanced
816 pages
20h 56m
English
Addison-Wesley Professional
Content preview from .NET Framework Security

Using Asymmetric Algorithms

The final portion of the core cryptographic object model to discuss is the set of classes that implement asymmetric algorithms and associated formatting/ deformatting functions. Asymmetric algorithms are represented in the .NET Framework by the AsymmetricAlgorithm class and its subclasses. Like their symmetric counterparts, individual asymmetric algorithms are represented in the object model as subclasses of the abstract AsymmetricAlgorithm class and specific implementations of an algorithm are subclasses of those subclasses. For example, the RSA algorithm is represented by the RSA class, which is a subclass of AsymmetricAlgorithm. An implementation of the RSA algorithm is provided by the RSACryptoServiceProvider

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Programming .NET Security

Programming .NET Security

Adam Freeman, Allen Jones
Pro C# 7: With .NET and .NET Core

Pro C# 7: With .NET and .NET Core

Andrew Troelsen, Philip Japikse
.Net Framework Essentials

.Net Framework Essentials

Thuan L. Thai, Hoang Lam

Publisher Resources

ISBN: 067232184XPurchase book