An enumeration of all the hash algorithms used for hashing files and for generating the strong name.
A hash function H is a transformation that takes an input m and returns a fixed-size string, which is called the hash value h (that is, h = H (m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography, the hash functions are usually chosen to have some additional properties.
The basic requirements for a cryptographic hash function are:
The hash value represents concisely the longer message or document from which it was computed; this value is called the message digest. One can think of a message digest as a "digital fingerprint" of the larger document. Examples of well-known hash functions are MD2 and and SHA.
[Visual Basic] Public Enum AssemblyHashAlgorithm [C#] public enum AssemblyHashAlgorithm [C++] public enum AssemblyHashAlgorithm
[JScript] In JScript, you can use the enumerations in the NGWS frameworks, but you cannot define your own.
Member Name | Description |
---|---|
MD5 | The MD5 message-digest algorithm. MD5 was developed by Rivest in 1991. It is basically MD4 with "safety-belts" and while it is slightly slower than MD4, it is more secure. The algorithm consists of four distinct rounds, which has a slightly different design from that of MD4. Message-digest size, as well as padding requirements, remain the same. |
None | No hash algorithm. |
SHA1 | A revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA. |
Namespace: System.Configuration.Assemblies
Assembly: mscorlib.dll