Udostępnij za pośrednictwem


Algorithms and keys (Windows Runtime apps)

[ This article is for Windows 8.x and Windows Phone 8.x developers writing Windows Runtime apps. If you’re developing for Windows 10, see the latest documentation ]

Cryptographic algorithms are procedures that perform cryptographic operations such as encryption, signing, and hashing. Cryptographic algorithms are implemented in algorithm providers. The following providers are available in the Windows.Security.Cryptography.Core namespace.

Algorithm provider class Supported algorithm types

AsymmetricKeyAlgorithmProvider

Asymmetric encryption algorithms

Asymmetric signature algorithms

SymmetricKeyAlgorithmProvider

Symmetric encryption algorithms

HashAlgorithmProvider

Hashing algorithms

MacAlgorithmProvider

Message authentication code algorithms

KeyDerivationAlgorithmProvider

Key derivation algorithms

 

Encryption algorithms can support symmetric keys or asymmetric keys. Symmetric or secret key encryption requires that the key used to encrypt a message also be used to decrypt the message. Asymmetric or public key encryption requires that the key used to decrypt be different from, but mathematically related to, the key used to encrypt. One of the keys is called private and kept secret. The other key is called public and is typically released to interested parties. Either key can be used to encrypt as long as the other is used to decrypt. A single key cannot be used to perform both functions.

A key is a pseudo random number used as input to an algorithm to encrypt, decrypt, sign data, or compute a message authentication code (MAC). Because it is easier to protect a key than an algorithm, using keys eliminates the need to keep an algorithm secret. All of the algorithms implemented by Microsoft are defined by publicly available standards. The strength of the key is related to its bit length. The greater the bit length, the stronger the key.

You can create, import, and export keys in an app, but you cannot store the keys you create or import. The following table shows methods you can use to create or import keys.

Class Method Description

AsymmetricKeyAlgorithmProvider

CreateKeyPair

Creates an asymmetric key pair.

ImportKeyPair

Imports an asymmetric key pair into a CryptographicKey object.

ImportPublicKey

Imports the public portion of an asymmetric key pair into a CryptographicKey object.

SymmetricKeyAlgorithmProvider

CreateSymmetricKey

Creates a symmetric key.

KeyDerivationAlgorithmProvider

CreateKey

Derives a key from a secret agreement value created from a public/private key pair.

CryptographicKey

Export

Exports a key into a buffer.

ExportPublicKey

Exports the public portion of a public/private key pair into a buffer.

 

Encryption