Export (0) Print
Expand All

DSA Class

Represents the abstract base class from which all implementations of the Digital Signature Algorithm (DSA) must inherit.

Namespace:  System.Security.Cryptography
Assembly:  mscorlib (in mscorlib.dll)

[<AbstractClass>]
[<ComVisibleAttribute(true)>]
type DSA =  
    class 
        inherit AsymmetricAlgorithm 
    end

The DSA type exposes the following members.

  NameDescription
Protected methodDSAInitializes a new instance of the DSA class.
Top

  NameDescription
Public propertyKeyExchangeAlgorithmWhen overridden in a derived class, gets the name of the key exchange algorithm. (Inherited from AsymmetricAlgorithm.)
Public propertyKeySizeGets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public propertyLegalKeySizesGets the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Public propertySignatureAlgorithmGets the name of the signature algorithm. (Inherited from AsymmetricAlgorithm.)
Top

  NameDescription
Public methodClearReleases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)
Public methodStatic memberCreate()Creates the default cryptographic object used to perform the asymmetric algorithm.
Public methodStatic memberCreate(String)Creates the specified cryptographic object used to perform the asymmetric algorithm.
Public methodCreateSignatureWhen overridden in a derived class, creates the DSA signature for the specified data.
Public methodDispose()Releases all resources used by the current instance of the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.)
Protected methodDispose(Boolean)Releases the unmanaged resources used by the AsymmetricAlgorithm class and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm.)
Public methodEquals(Object)Determines whether the specified object is equal to the current object. (Inherited from Object.)
Public methodExportParametersWhen overridden in a derived class, exports the DSAParameters.
Protected methodFinalizeAllows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)
Public methodFromXmlStringReconstructs a DSA object from an XML string. (Overrides AsymmetricAlgorithm.FromXmlString(String).)
Public methodGetHashCodeServes as the default hash function. (Inherited from Object.)
Public methodGetTypeGets the Type of the current instance. (Inherited from Object.)
Public methodImportParametersWhen overridden in a derived class, imports the specified DSAParameters.
Protected methodMemberwiseCloneCreates a shallow copy of the current Object. (Inherited from Object.)
Public methodToStringReturns a string that represents the current object. (Inherited from Object.)
Public methodToXmlStringCreates and returns an XML string representation of the current DSA object. (Overrides AsymmetricAlgorithm.ToXmlString(Boolean).)
Public methodVerifySignatureWhen overridden in a derived class, verifies the DSA signature for the specified data.
Top

  NameDescription
Protected fieldKeySizeValueRepresents the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Protected fieldLegalKeySizesValueSpecifies the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.)
Top

You can use the DSA class and derived classes to create digital signatures that help protect the integrity of your data. The DSACryptoServiceProvider provides an implementation of this class.

To use a public-key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest. The sender then encrypts the message digest with the sender's private key to create the sender's personal signature. Upon receiving the message and signature, the receiver decrypts the signature using the sender's public key to recover the message digest and hashes the message using the same hash algorithm that the sender used. If the message digest that the receiver computes exactly matches the message digest received from the sender, the receiver can assume that the message was not altered while in transit. Note that a signature can be verified by anyone, because the sender's public key is common knowledge.

Newer asymmetric algorithms are available. Consider using the RSA class, the ECDSA class, or the ECDiffieHellman class instead of the DSA class. Use DSA only for compatibility with legacy applications and data.

This algorithm supports key lengths from 512 bits to 1024 bits in increments of 64 bits.

.NET Framework

Supported in: 4.5.2, 4.5.1, 4.5, 4, 3.5, 3.0, 2.0, 1.1, 1.0

.NET Framework Client Profile

Supported in: 4, 3.5 SP1

Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Vista SP2, Windows Server 2008 (Server Core Role not supported), Windows Server 2008 R2 (Server Core Role supported with SP1 or later; Itanium not supported)

The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.

Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe.
Show:
© 2014 Microsoft