Chapter Five. Digital Signatures

In the previous chapter we looked at how asymmetric algorithms, particularly RSA, can be used to achieve privacy. It turns out that there is another facet to asymmetric algorithms, known as digital signing, that is used to achieve authentication, integrity, and nonrepudiation. In this chapter, we look at how digital signatures work, and, in particular, we look at how RSA and DSA (Digital Signature Algorithm) are used to implement digital signatures. Both RSA and DSA are fully supported by the .NET Framework, so we look at complete programming examples to demonstrate these two signature techniques.

Digital signatures also require another type of cryptographic primitive, known as cryptographic hash algorithms. ...

Get .NET Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.