Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The System.Security.Cryptography namespace contains classes that allow you to perform both symmetric and asymmetric cryptography, create hashes, and provide random number generation. Successful cryptography is the result of combining these tasks. This section describes the key cryptographic tasks that you can perform to create a cryptographic scheme.
In This Section
- Encrypting and Decrypting Data 
 Describes how to generate and manage keys and how to encrypt and decrypt data.
- Cryptographic Signatures 
 Describes how to generate and verify cryptographic signatures.
- Ensuring Data Integrity with Hash Codes 
 Describes how to generate and verify hash codes.
- Creating a Cryptographic Scheme 
 Describes how to help create a cryptographic scheme from the various cryptographic primitives.
- Extending the KeyedHashAlgorithm Class 
 Describes how to extend the .NET Framework cryptographic classes by creating a keyed hash algorithm class that implements the MD5 hash algorithm.
- XML Encryption and Digital Signatures 
 Provides links to reference and task-based documentation for XML encryption and digital signatures.
- How to: Use Data Protection 
 Describes how to use the managed data protection API (DPAPI) to encrypt and decrypt data.
- How to: Access Hardware Encryption Devices 
 Describes how to use hardware encryption devices with the .NET Framework.
Related Sections
- Cryptographic Services 
 Provides an overview of cryptography and explains how to perform cryptography with the .NET Framework.
- Securing .NET Framework Applications 
 Describes the entire .NET Framework security system.
- Configuring Cryptography Classes 
 Describes how to map algorithm names to cryptographic classes and how to map object identifiers to a cryptographic algorithm.