Encapsulates the name of an encryption algorithm.
Assembly: System.Core (in System.Core.dll)
Thetype exposes the following members.
|Algorithm||Gets the algorithm name that the current object specifies.|
|ECDiffieHellmanP256||Gets a object that specifies an Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm that uses the P-256 curve.|
|ECDiffieHellmanP384||Gets a object that specifies an Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm that uses the P-384 curve.|
|ECDiffieHellmanP521||Gets a object that specifies an Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm that uses the P-521 curve.|
|ECDsaP256||Gets a object that specifies an Elliptic Curve Digital Signature Algorithm (ECDSA) that uses the P-256 curve.|
|ECDsaP384||Gets a object that specifies an Elliptic Curve Digital Signature Algorithm (ECDSA) that uses the P-384 curve.|
|ECDsaP521||Gets a new object that specifies an Elliptic Curve Digital Signature Algorithm (ECDSA) that uses the P-521 curve.|
|MD5||Gets a new object that specifies the Message Digest 5 (MD5) hash algorithm.|
|Sha1||Gets a new object that specifies the Secure Hash Algorithm 1 (SHA-1) algorithm.|
|Sha256||Gets a new object that specifies the Secure Hash Algorithm 256 (SHA-256) algorithm.|
|Sha384||Gets a new object that specifies the Secure Hash Algorithm 384 (SHA-384) algorithm.|
|Sha512||Gets a new object that specifies the Secure Hash Algorithm 512 (SHA-512) algorithm.|
|Equals(CngAlgorithm)||Compares the specified object to the current object.|
|Equals(Object)||Compares the specified object to the current object. (Overrides Object.Equals(Object).)|
|GetHashCode||Generates a hash value for the algorithm name that is embedded in the current object. (Overrides Object.GetHashCode().)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|ToString||Gets the name of the algorithm that the current object specifies. (Overrides Object.ToString().)|
The class is a utility class. It consists of static properties, comparison methods, and a private, internally maintained, algorithm name string.
The static properties return objects. Each object's internal string is initialized to the algorithm name that corresponds to the name of the static property.
You can also use this class to create objects for algorithm types that are not covered by the static properties.
Several Cryptography Next Generation (CNG) classes (such as CngKey) accept objects through an algorithm parameter. When the class receives the object, it retrieves the embedded algorithm name by calling the object's Algorithm property.
Therefore, serves as an enumeration of well-known algorithms. It lets you specify a well-known algorithm by using a strongly typed value instead of a string.
The HostProtectionAttribute attribute applied to this type or member has the following Resources property value: MayLeakOnAbort. The HostProtectionAttribute does not affect desktop applications (which are typically started by double-clicking an icon, typing a command, or entering a URL in a browser). For more information, see the HostProtectionAttribute class or SQL Server Programming and Host Protection Attributes.
Windows Phone 8.1, Windows Phone 8, Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Vista SP2, Windows Server 2008 (Server Core Role not supported), Windows Server 2008 R2 (Server Core Role supported with SP1 or later; Itanium not supported)
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.