Cryptographic Tasks
The System.Security.Cryptography namespace contains classes that allow you to perform both symmetric and asymmetric cryptography, create hashes, and provide random number generation. Successful cryptography is the result of combining these tasks. This section describes the key cryptographic tasks that you can perform to create a cryptographic scheme.
In This Section
Encrypting and Decrypting Data
Describes how to generate and manage keys and how to encrypt and decrypt data.Cryptographic Signatures
Describes how to generate and verify cryptographic signatures.Ensuring Data Integrity with Hash Codes
Describes how to generate and verify hash codes.Creating a Cryptographic Scheme
Describes how to help create a cryptographic scheme from the various cryptographic primitives.Extending the KeyedHashAlgorithm Class
Describes how to extend the .NET Framework cryptographic classes by creating a keyed hash algorithm class that implements the MD5 hash algorithm.XML Encryption and Digital Signatures
Provides links to reference and task-based documentation for XML encryption and digital signatures.How to: Use Data Protection
Describes how to use the managed data protection API (DPAPI) to encrypt and decrypt data.How to: Access Hardware Encryption Devices
Describes how to use hardware encryption devices with the .NET Framework.
Related Sections
Cryptographic Services
Provides an overview of cryptography and explains how to perform cryptography with the .NET Framework.Securing .NET Framework Applications
Describes the entire .NET Framework security system.Configuring Cryptography Classes
Describes how to map algorithm names to cryptographic classes and how to map object identifiers to a cryptographic algorithm.