April 2002
Intermediate to advanced
816 pages
20h 56m
English
You will recall from our discussion in the “The Cryptographic Object Model of the .NET Framework” section of Chapter 30 that the .NET Framework's cryptographic object model was designed to be easily extended by third parties. While the .NET Framework includes implementations of common symmetric and asymmetric algorithms, hash functions, and keyed hash functions, it may be necessary or desirable for various reasons to add new algorithms or algorithm implementations to the object hierarchy. For example, you might have a cryptographic hardware accelerator that you want to perform RSA decryptions from within the .NET Framework, or you might want to use ...
Read now
Unlock full access