System.Security.Cryptography Namespace

Class Description Aes

Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Advanced Encryption Standard (AES) algorithm.

Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm.

Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm.

Represents Abstract Syntax Notation One (ASN.1)-encoded data.

Represents a collection of AsnEncodedData objects. This class cannot be inherited.

Provides the ability to navigate through an AsnEncodedDataCollection object. This class cannot be inherited.

Represents the abstract base class from which all implementations of asymmetric algorithms must inherit.

Represents the base class from which all asymmetric key exchange deformatters derive.

Represents the base class from which all asymmetric key exchange formatters derive.

Represents the abstract base class from which all implementations of asymmetric signature deformatters derive.

Represents the base class from which all implementations of asymmetric signature formatters derive.

Encapsulates the name of an encryption algorithm.

Encapsulates the name of an encryption algorithm group.

Defines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects.

Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects.

Contains advanced properties for key creation.

Provides a strongly typed collection of Cryptography Next Generation (CNG) properties.

Encapsulates the name of a key storage provider (KSP) for use with Cryptography Next Generation (CNG) objects.

Encapsulates optional configuration parameters for the user interface (UI) that Cryptography Next Generation (CNG) displays when you access a protected key.

Performs a cryptographic transformation of data. This class cannot be inherited.

Accesses the cryptography configuration information.

Contains a type and a collection of values associated with that type.

Contains a set of CryptographicAttributeObject objects.

Provides enumeration functionality for the CryptographicAttributeObjectCollection collection. This class cannot be inherited.

The exception that is thrown when an error occurs during a cryptographic operation.

The exception that is thrown when an unexpected operation occurs during a cryptographic operation.

Defines a stream that links data streams to cryptographic transformations.

Provides additional information about a cryptographic key pair. This class cannot be inherited.

Contains parameters that are passed to the cryptographic service provider (CSP) that performs cryptographic computations. This class cannot be inherited.

Provides the base class for data protectors.

Represents the abstract base class from which all classes that derive byte sequences of a specified length inherit.

Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. This class cannot be inherited.

Provides simple data protection methods.

Represents the abstract base class from which all implementations of the Digital Signature Algorithm (DSA) must inherit.

Provides a Cryptography Next Generation (CNG) implementation of the Digital Signature Algorithm (DSA).

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the DSA algorithm. This class cannot be inherited.

Verifies a Digital Signature Algorithm (DSA) PKCS#1 v1.5 signature.

Creates a Digital Signature Algorithm (DSA) signature.

Provides an abstract base class that Elliptic Curve Diffie-Hellman (ECDH) algorithm implementations can derive from. This class provides the basic set of operations that all ECDH implementations must support.

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Diffie-Hellman (ECDH) algorithm. This class is used to perform cryptographic operations.

Specifies an Elliptic Curve Diffie-Hellman (ECDH) public key for use with the ECDiffieHellmanCng class.

Provides an abstract base class from which all ECDiffieHellmanCngPublicKey implementations must inherit.

Provides an abstract base class that encapsulates the Elliptic Curve Digital Signature Algorithm (ECDSA).

Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).

Converts a CryptoStream from base 64.

Represents the base class from which all implementations of cryptographic hash algorithms must derive.

Represents the abstract class from which all implementations of Hash-based Message Authentication Code (HMAC) must derive.

Computes a Hash-based Message Authentication Code (HMAC) by using the MD5 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the RIPEMD160 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA1 hash function.

Computes a Hash-based Message Authentication Code (HMAC) by using the SHA256 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA384 hash function.

Computes a Hash-based Message Authentication Code (HMAC) using the SHA512 hash function.

Represents the abstract class from which all implementations of keyed hash algorithms must derive.

Determines the set of valid key sizes for the symmetric cryptographic algorithms.

Computes a Message Authentication Code (MAC) using TripleDES for the input data CryptoStream.

Provides information for a manifest signature.

Represents a read-only collection of ManifestSignatureInformation objects.

Represents the abstract class from which all mask generator algorithms must derive.

Represents the abstract class from which all implementations of the MD5 hash algorithm inherit.

Provides a CNG (Cryptography Next Generation) implementation of the MD5 (Message Digest 5) 128-bit hashing algorithm.

Computes the MD5 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents a cryptographic object identifier. This class cannot be inherited.

Represents a collection of Oid objects. This class cannot be inherited.

Provides the ability to navigate through an OidCollection object. This class cannot be inherited.

Derives a key from a password using an extension of the PBKDF1 algorithm.

Computes masks according to PKCS #1 for use by key exchange algorithms.

Provides methods for encrypting and decrypting data. This class cannot be inherited.

Provides methods for protecting and unprotecting memory. This class cannot be inherited.

Represents the abstract class from which all implementations of cryptographic random number generators derive.

Represents the base class from which all implementations of the RC2 algorithm must derive.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the RC2 algorithm. This class cannot be inherited.

Implements password-based key derivation functionality, PBKDF2, by using a pseudo-random number generator based on HMACSHA1.

Represents the base class from which all implementations of the Rijndael symmetric encryption algorithm must inherit.

Accesses the managed version of the Rijndael algorithm. This class cannot be inherited.

Performs a cryptographic transformation of data using the Rijndael algorithm. This class cannot be inherited.

Represents the abstract class from which all implementations of the MD160 hash algorithm inherit.

Computes the RIPEMD160 hash for the input data using the managed library.

Implements a cryptographic Random Number Generator (RNG) using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Represents the base class from which all implementations of the RSA algorithm inherit.

Provides a Cryptography Next Generation (CNG) implementation of the RSA algorithm.

Performs asymmetric encryption and decryption using the implementation of the RSA algorithm provided by the cryptographic service provider (CSP). This class cannot be inherited.

Specifies the padding mode and parameters to use with RSA encryption or decryption operations.

Decrypts Optimal Asymmetric Encryption Padding (OAEP) key exchange data.

Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using RSA.

Decrypts the PKCS #1 key exchange data.

Creates the PKCS#1 key exchange data using RSA.

Verifies an RSA PKCS #1 version 1.5 signature.

Creates an RSA PKCS #1 version 1.5 signature.

Specifies the padding mode and parameters to use with RSA signature creation or verification operations.

Computes the SHA1 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA).

Computes the SHA1 hash value for the input data using the implementation provided by the cryptographic service provider (CSP). This class cannot be inherited.

Computes the SHA1 hash for the input data using the managed library.

Computes the SHA256 hash for the input data.

Provides a Cryptography Next Generation (CNG) implementation of the Secure Hash Algorithm (SHA) for 256-bit hash values.

Defines a wrapper object to access the cryptographic service provider (CSP) implementation of the SHA256 algorithm.

View post:
System.Security.Cryptography Namespace

Related Posts
This entry was posted in $1$s. Bookmark the permalink.