Windows.Security.Cryptography.Core classes
The classes in the following table can be used to encrypt and decrypt data by using either symmetric or asymmetric key algorithms. The classes can also be used to create hashed and message authentication codes and to sign content.
In this section
Topic | Description |
---|---|
Contains static properties that enable you to retrieve algorithm names that can be used in the OpenAlgorithm method of the AsymmetricKeyAlgorithmProvider class. |
|
Represents a provider of asymmetric (public) key algorithms. |
|
Encrypts, decrypts, and signs content, and verifies digital signatures. |
|
Represents a reusable hashing object and contains the result of a hashing operation. |
|
Represents a symmetric key or an asymmetric key pair. |
|
Contains static properties that enable you to retrieve supported elliptic curve cryptography (ECC) algorithm names. |
|
Contains data that can be retrieved from encrypted and authenticated data. |
|
Contains static properties that enable you to retrieve algorithm names that can be used in the OpenAlgorithm method of the HashAlgorithmProvider class. |
|
Represents a cryptographic hash provider. |
|
Contains static properties that enable you to retrieve algorithm names that can be used in the OpenAlgorithm method of the KeyDerivationAlgorithmProvider class. |
|
Represents a key derivation algorithm provider. |
|
Represents parameters used when deriving a key. |
|
Contains static properties that enable you to retrieve algorithm names that can be used in the OpenAlgorithm method of the MacAlgorithmProvider class. |
|
Represents a message authentication code (MAC). |
|
Contains static properties that enable you to retrieve algorithm names that can be used in the OpenAlgorithm method of the SymmetricKeyAlgorithmProvider class. |
|
Retrieves a persisted key from a Certificate object. |
|
Represents a provider of symmetric key algorithms. |