Name
AsymmetricAlgorithm
Synopsis
public abstract class AsymmetricAlgorithm : IDisposable { // Protected Constructors protected AsymmetricAlgorithm( ); // Protected Instance Fields protected int KeySizeValue; protected KeySizes[ ] LegalKeySizesValue; // Public Instance Properties public abstract string KeyExchangeAlgorithm{get; } public virtual int KeySize{set; get; } public virtual KeySizes[ ] LegalKeySizes{get; } public abstract string SignatureAlgorithm{get; } // Public Static Methods public static AsymmetricAlgorithm Create( ); public static AsymmetricAlgorithm Create(stringalgName
); // Public Instance Methods public void Clear( ); public abstract void FromXmlString(stringxmlString
); public abstract string ToXmlString(boolincludePrivateParameters
); // Protected Instance Methods protected abstract void Dispose(booldisposing
); }
An asymmetric algorithm is one where the sender and the recipient do
not share the same knowledge (i.e. only one party knows the secret
key). All asymmetric algorithm implementation classes inherit from
this abstract class. Implementations are instantiated using the
Create( )
method, which accepts the name of an
implementation as a String
argument; the default
implementation class is created if no name is specified; the system
administrator determines the default class.
The LegalKeySizes
property returns an array of the
KeySizes
class, specifing the set of key lengths
supported by an implementation class. The KeySize
property gets or sets the key length. ...
Get Programming .NET Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.