Security. Cryptography. Core Namespace
Some information relates to prerelease product that may be substantially modified before it’s released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Contains classes that enable you to create cryptographic keys, to hash and sign content, create message authentication codes, and to encrypt or decrypt data.
Represents a provider of asymmetric (public) key algorithms. For more information, see Cryptographic keys.
Encrypts, decrypts, and signs content, and verifies digital signatures.
Represents a reusable hashing object and contains the result of a hashing operation.
Represents a symmetric key or an asymmetric key pair.
Contains static properties that enable you to retrieve supported elliptic curve cryptography (ECC) algorithm names.
Contains data that can be retrieved from encrypted and authenticated data. Authenticated encryption algorithms are opened by using the SymmetricKeyAlgorithmProvider class.
Represents a cryptographic hash provider. For more information about hashes, see MACs, hashes, and signatures.
Represents a key derivation algorithm provider.
Represents parameters used when deriving a key.
Represents a message authentication code (MAC). A MAC uses symmetric key cryptography to prevent message tampering. For more information, see MACs, hashes, and signatures.
Retrieves a persisted key from a Certificate object.
Represents a provider of symmetric key algorithms. For more information, see Cryptographic keys.
Represents information about a target algorithm.
Specifies a padding mode for asymmetric algorithm signature or encryption operations.
Specifies the type of the private key contained in a buffer.
Specifies the type of the public key contained in a buffer.
Submit and view feedback for