

Specifies a key BLOB format for use with Microsoft Cryptography Next Generation (CNG) objects.Ĭontains advanced properties for key creation. Represents a symmetric key to be used with the ChaCha20 stream cipher in the combined mode with the Poly1305 authenticator.Įncapsulates the name of an encryption algorithm.Įncapsulates the name of an encryption algorithm group.ĭefines the core functionality for keys that are used with Cryptography Next Generation (CNG) objects. Represents the base class from which all implementations of asymmetric signature formatters derive.

Represents the abstract base class from which all implementations of asymmetric signature deformatters derive. Represents the base class from which all asymmetric key exchange formatters derive. Represents the base class from which all asymmetric key exchange deformatters derive. Represents the abstract base class from which all implementations of asymmetric algorithms must inherit.

Provides the ability to navigate through an AsnEncodedDataCollection object. Represents a collection of AsnEncodedData objects. Represents Abstract Syntax Notation One (ASN.1)-encoded data.

Provides a managed implementation of the Advanced Encryption Standard (AES) symmetric algorithm. Represents an Advanced Encryption Standard (AES) key to be used with the Galois/Counter Mode (GCM) mode of operation. Performs symmetric encryption and decryption using the Cryptographic Application Programming Interfaces (CAPI) implementation of the Advanced Encryption Standard (AES) algorithm. Provides a Cryptography Next Generation (CNG) implementation of the Advanced Encryption Standard (AES) algorithm. Represents an Advanced Encryption Standard (AES) key to be used with the Counter with CBC-MAC (CCM) mode of operation. Represents the abstract base class from which all implementations of the Advanced Encryption Standard (AES) must inherit. For more information, see Cryptographic Services. Provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, such as hashing, random number generation, and message authentication.
