April 2002
Intermediate to advanced
816 pages
20h 56m
English
By Brian A. LaMacchia
IN THIS CHAPTER
In Chapter 30, “Using Cryptography with the .NET Framework: The Basics,” you saw how to use a cryptographic hash function and an asymmetric (public key) algorithm to compute a digital signature for some content. The digital signatures you generated were simply binary arrays that encoded the mathematical output of applying the asymmetric signing function to a hash value. In theory, any binary content can be signed using only the core techniques ...
Read now
Unlock full access