次の方法で共有


AssemblyHashAlgorithm Enumeration

Microsoft Silverlight will reach end of support after October 2021. Learn more.

Specifies all the hash algorithms used for hashing files and for generating the strong name.

Namespace:  System.Configuration.Assemblies
Assembly:  mscorlib (in mscorlib.dll)

Syntax

'Declaration
<ComVisibleAttribute(True)> _
Public Enumeration AssemblyHashAlgorithm
[ComVisibleAttribute(true)]
public enum AssemblyHashAlgorithm

Members

Member name Description
Supported by Silverlight for Windows PhoneSupported by Xbox 360 None A mask indicating that there is no hash algorithm. If you specify None for a multi-module assembly, the common language runtime defaults to the SHA1 algorithm, because multi-module assemblies have to generate a hash.
Supported by Silverlight for Windows PhoneSupported by Xbox 360 MD5 A mask used to retrieve the MD5 message-digest algorithm. MD5 was developed by Rivest in 1991. It is basically MD4 with safety-belts; although it is slightly slower than MD4, it helps provide better security. The algorithm consists of four distinct rounds, which have a slightly different design from that of MD4. Message-digest size, as well as padding requirements, remain the same.
Supported by Silverlight for Windows PhoneSupported by Xbox 360 SHA1 A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.

Remarks

A hash function H is a transformation that takes an input m and returns a fixed-size string, which is called the hash value h (that is, h = H (m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography, the hash functions are usually chosen to have some additional properties.

The basic requirements for a cryptographic hash function are as follows:

  • The input can be of any length.

  • The output has a fixed length.

  • H (x) is relatively easy to compute for any given x.

  • H (x) is one-way.

  • H (x) is collision-free.

The hash value represents concisely the longer message or document from which it was computed; this value is called the message digest. You can think of a message digest as a digital fingerprint of the larger document. Examples of well-known hash functions are MD2 and and SHA.

Version Information

Silverlight

Supported in: 5, 4, 3

Silverlight for Windows Phone

Supported in: Windows Phone OS 7.1, Windows Phone OS 7.0

XNA Framework

Supported in: Xbox 360, Windows Phone OS 7.0

Platforms

For a list of the operating systems and browsers that are supported by Silverlight, see Supported Operating Systems and Browsers.