Chapter 32. Using Cryptography with the .NET Framework: Creating and Verifying XML Digital Signatures

By Brian A. LaMacchia

IN THIS CHAPTER

In Chapter 30, “Using Cryptography with the .NET Framework: The Basics,” you saw how to use a cryptographic hash function and an asymmetric (public key) algorithm to compute a digital signature for some content. The digital signatures you generated were simply binary arrays that encoded the mathematical output of applying the asymmetric signing function to a hash value. In theory, any binary content can be signed using only the core techniques ...

Get .NET Framework Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.