The System.Security.Cryptography namespace contains classes that allow you to perform both symmetric and asymmetric cryptography, create hashes, and provide random number generation. Successful cryptography is the result of combining these tasks. This section describes the key cryptographic tasks that you can perform to create a cryptographic scheme.
In This Section
- Encrypting and Decrypting Data
Describes how to generate and manage keys and how to encrypt and decrypt data.
- Cryptographic Signatures
Describes how to generate and verify cryptographic signatures.
- Ensuring Data Integrity with Hash Codes
Describes how to generate and verify hash codes.
- Creating a Cryptographic Scheme
Describes how to help create a cryptographic scheme from the various cryptographic primitives.
- Extending the KeyedHashAlgorithm Class
Describes how to extend the .NET Framework cryptographic classes by creating a keyed hash algorithm class that implements the MD5 hash algorithm.
Provides links to reference and task-based documentation for XML encryption and digital signatures.
Describes how to use the managed data protection API (DPAPI) to encrypt and decrypt data.
Describes how to use hardware encryption devices with the .NET Framework.