DSA Class
Represents the abstract base class from which all implementations of the Digital Signature Algorithm (DSA) must inherit.
System.Security.Cryptography::AsymmetricAlgorithm
System.Security.Cryptography::DSA
System.Security.Cryptography::DSACryptoServiceProvider
Assembly: mscorlib (in mscorlib.dll)
The DSA type exposes the following members.
| Name | Description | |
|---|---|---|
![]() | KeyExchangeAlgorithm | When overridden in a derived class, gets the name of the key exchange algorithm. (Inherited from AsymmetricAlgorithm.) |
![]() | KeySize | Gets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.) |
![]() | LegalKeySizes | Gets the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.) |
![]() | SignatureAlgorithm | Gets the name of the signature algorithm. (Inherited from AsymmetricAlgorithm.) |
| Name | Description | |
|---|---|---|
![]() | Clear | Releases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.) |
![]() ![]() | Create() | Creates the default cryptographic object used to perform the asymmetric algorithm. |
![]() ![]() | Create(String) | Creates the specified cryptographic object used to perform the asymmetric algorithm. |
![]() | CreateSignature | When overridden in a derived class, creates the DSA signature for the specified data. |
![]() | Dispose() | Releases all resources used by the current instance of the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm.) |
![]() | Dispose(Boolean) | Releases the unmanaged resources used by the AsymmetricAlgorithm class and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm.) |
![]() | Equals(Object) | Determines whether the specified Object is equal to the current Object. (Inherited from Object.) |
![]() | ExportParameters | When overridden in a derived class, exports the DSAParameters. |
![]() | Finalize | Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.) |
![]() | FromXmlString | Reconstructs a DSA object from an XML string. (Overrides AsymmetricAlgorithm::FromXmlString(String).) |
![]() | GetHashCode | Serves as a hash function for a particular type. (Inherited from Object.) |
![]() | GetType | Gets the Type of the current instance. (Inherited from Object.) |
![]() | ImportParameters | When overridden in a derived class, imports the specified DSAParameters. |
![]() | MemberwiseClone | Creates a shallow copy of the current Object. (Inherited from Object.) |
![]() | ToString | Returns a string that represents the current object. (Inherited from Object.) |
![]() | ToXmlString | Creates and returns an XML string representation of the current DSA object. (Overrides AsymmetricAlgorithm::ToXmlString(Boolean).) |
![]() | VerifySignature | When overridden in a derived class, verifies the DSA signature for the specified data. |
| Name | Description | |
|---|---|---|
![]() | KeySizeValue | Represents the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.) |
![]() | LegalKeySizesValue | Specifies the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm.) |
You can use the DSA class and derived classes to create digital signatures that help protect the integrity of your data. The DSACryptoServiceProvider provides an implementation of this class.
To use a public-key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest. The sender then encrypts the message digest with the sender's private key to create the sender's personal signature. Upon receiving the message and signature, the receiver decrypts the signature using the sender's public key to recover the message digest and hashes the message using the same hash algorithm that the sender used. If the message digest that the receiver computes exactly matches the message digest received from the sender, the receiver can assume that the message was not altered while in transit. Note that a signature can be verified by anyone, because the sender's public key is common knowledge.
This algorithm supports key lengths from 512 bits to 1024 bits in increments of 64 bits.
Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows XP SP2 x64 Edition, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.
