Represents the abstract base class from which all implementations of the Digital Signature Algorithm () must inherit.
Assembly: mscorlib (in mscorlib.dll)
Thetype exposes the following members.
|KeyExchangeAlgorithm||When overridden in a derived class, gets the name of the key exchange algorithm. (Inherited from AsymmetricAlgorithm.)|
|KeySize||Gets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)|
|LegalKeySizes||Gets the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)|
|SignatureAlgorithm||Gets the name of the signature algorithm. (Inherited from AsymmetricAlgorithm.)|
|Clear||Releases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)|
|Create()||Creates the default cryptographic object used to perform the asymmetric algorithm.|
|Create(String)||Creates the specified cryptographic object used to perform the asymmetric algorithm.|
|CreateSignature||When overridden in a derived class, creates the signature for the specified data.|
|Dispose()||Releases all resources used by the current instance of the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)|
|Dispose(Boolean)||Releases the unmanaged resources used by the AsymmetricAlgorithm class and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm.)|
|Equals(Object)||Determines whether the specified object is equal to the current object. (Inherited from Object.)|
|ExportParameters||When overridden in a derived class, exports the DSAParameters.|
|Finalize||Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)|
|FromXmlString||Reconstructs a object from an XML string. (Overrides AsymmetricAlgorithm.FromXmlString(String).)|
|GetHashCode||Serves as a hash function for a particular type. (Inherited from Object.)|
|GetType||Gets the Type of the current instance. (Inherited from Object.)|
|ImportParameters||When overridden in a derived class, imports the specified DSAParameters.|
|MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)|
|ToString||Returns a string that represents the current object. (Inherited from Object.)|
|ToXmlString||Creates and returns an XML string representation of the current object. (Overrides AsymmetricAlgorithm.ToXmlString(Boolean).)|
|VerifySignature||When overridden in a derived class, verifies the signature for the specified data.|
You can use the class and derived classes to create digital signatures that help protect the integrity of your data. The DSACryptoServiceProvider provides an implementation of this class.
To use a public-key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest. The sender then encrypts the message digest with the sender's private key to create the sender's personal signature. Upon receiving the message and signature, the receiver decrypts the signature using the sender's public key to recover the message digest and hashes the message using the same hash algorithm that the sender used. If the message digest that the receiver computes exactly matches the message digest received from the sender, the receiver can assume that the message was not altered while in transit. Note that a signature can be verified by anyone, because the sender's public key is common knowledge.
Newer asymmetric algorithms are available. Consider using the RSA class, the ECDSA class, or the ECDiffieHellman class instead of the class. Use only for compatibility with legacy applications and data.
This algorithm supports key lengths from 512 bits to 1024 bits in increments of 64 bits.
Windows 8, Windows Server 2012, Windows 7, Windows Vista SP2, Windows Server 2008 (Server Core Role not supported), Windows Server 2008 R2 (Server Core Role supported with SP1 or later; Itanium not supported)
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.