Summary

This chapter introduced digital signatures, which are based on cryptographic hash and asymmetric encryption algorithms. In particular, the RSA and DSA digital signature algorithms were discussed. The mathematical foundations of these two algorithms were briefly reviewed, followed by working program examples showing how to use the DSACryptoServiceProvider and RSACryptoServiceProvider classes. In Chapter 6 we continue the study of digital signatures, but we focus on how XML cryptography is used in combination with digital signatures.

Get .NET Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.