Extending the .NET Framework's Cryptography Classes and the Cryptographic Configuration System

You will recall from our discussion in the “The Cryptographic Object Model of the .NET Framework” section of Chapter 30 that the .NET Framework's cryptographic object model was designed to be easily extended by third parties. While the .NET Framework includes implementations of common symmetric and asymmetric algorithms, hash functions, and keyed hash functions, it may be necessary or desirable for various reasons to add new algorithms or algorithm implementations to the object hierarchy. For example, you might have a cryptographic hardware accelerator that you want to perform RSA decryptions from within the .NET Framework, or you might want to use ...

Get .NET Framework Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.