Export (0) Print
Expand All

Obtaining a Hash Value

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.

An example of when you might want to obtain a hash value is when you have a password that you do not want to pass over the network.

Typical Goals

In this scenario, the goal is to use the application block to generate a hash value from input data.

Solution

Call the appropriate overload (string or byte array) of the static method CreateHash on the Cryptographer class to obtain the hash, specifying the data to be hashed and supplying the name of the configured hash provider.

QuickStart

For an extended example of how to use the CreateHash method to obtain a hash value, see Walkthrough: Getting a Hash Value.

Using CreateHash

The following code shows how to use the CreateHash method on data in the form of a string.

byte[] valueToHash = (new UnicodeEncoding()).GetBytes("password");
byte[] generatedHash = Cryptographer.CreateHash("hashProvider", valueToHash);

// Clear the byte array memory.
Array.Clear(valueToHash, 0, valueToHash.Length);

Usage Notes

Consider the following points when you create a hash value.

  • The CreateHash method takes two overloads. The overload you use depends on whether you are creating a hash from a string or byte array.
  • Make sure that you specify a hash provider in the Enterprise Library Configuration Console.
  • Sensitive data should be cleared in memory as soon as possible. Leaving sensitive data unencrypted in memory can expose the data to security risks. You should note that data in memory may also end up on the hard disk, because the operating system can write data to a swap file. Also, if the computer crashes, the operating system can dump the contents of memory to disk.

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The latest Enterprise Library information can be found at the Enterprise Library site.
Show:
© 2014 Microsoft