Information
The topic you requested is included in another documentation set. For convenience, it's displayed below. Choose Switch to see the topic in its original location.

Cryptographic Hash Algorithms Sample 

Download sample

This sample demonstrates how to use hash functions to ensure data integrity.

Security noteSecurity Note

This sample code is provided to illustrate a concept and should not be used in applications or Web sites, as it may not illustrate the safest coding practices. Microsoft assumes no liability for incidental or consequential damages should the sample code be used for purposes other than as intended.

To open the sample file in Solution Explorer

  1. Click Download Sample.

    The File Download message box appears.

  2. Click Open, and on the left column of the zip folder window, click Extract all files.

    The Extraction Wizard opens.

  3. Click Next. You can change the directory that the files will be extracted to, and then click Next again.

  4. Make sure that the Show extracted files check box is selected, and click Finish.

  5. Double-click the sample's .sln file.

    The sample solution is displayed in Solution Explorer. You might get a security warning that says the solution location is not trusted. Click OK to continue.

To run this sample

  • Press F5.

Demonstrates

The application compares two hash values: the hash value of text in a file to the hash value of text in a TextBox control. Hash values are unique and compact numerical representations of a piece of data. The text file is an XML version of the Products table of the Northwind database. When the application starts, the XML file, stored in My.Resources, is retrieved and loaded into the TextBox control. The hash value for the XML file is calculated. When you click the Compare! button, the hash value of the TextBox text is calculated. If you have not changed the text in the TextBox control, the hash values will match. Changing even one character in a source file changes the hash value.

The RadioButton controls determine the type of hash calculated: MD5, SHA1, or SHA384. A separate .NET Framework class, derived from the HashAlgorithm class, exists for each hash algorithm. These classes are used to calculate the hash values.

See Also

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

Show:
© 2014 Microsoft