Reintroduce GetAsymmetricAlgorithm/GetSymmetricAlgorithm
See original GitHub issueThe base AsymmetricSecurityKey
and SymmetricSecurityKey
classes should expose GetAsymmetricAlgorithm
/GetSymmetricAlgorithm
to allow retrieving the underlying algorithm without having to cast the security key to known types.
@brentschmaltz any chance we could bring back these APIs for RTM?
Issue Analytics
- State:
- Created 7 years ago
- Comments:19 (19 by maintainers)
Top Results From Across the Web
Asymmetric and Symmetric Encryption | by Laurent Balmelli
In a symmetric encryption scheme, once a key has been decided by the parties, the encryption of the plain text can now begin....
Read more >Cryptography: Symmetric vs Asymmetric Encryption
Asymmetrical encryption is hardly ever used to directly encrypt large amounts of data, unlike symmetric; it increases the size of the cryptogram ...
Read more >Asymmetric Encryption - an overview
Asymmetric and symmetric encryption are typically used together: use an asymmetric algorithm such as RSA to securely send someone an AES (symmetric) key....
Read more >Asymmetric Encryption for Multiple Recipients?
So encrypting just a symmetric key with the expensive asymmetric algorithm and then using that symmetric key for the bulk of the message...
Read more >Symmetric and Asymmetric Encryption INTRODUCTION
These se- cret keys are used in the encryption process to introduce uncertainty (to the unauthor- ized receiver), which can be removed in...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@tushargupta51 for RC2, it’s of course too late, that’s why I suggested keeping the API as-is (no rollback) and adding the necessary stuff in the next milestone 👍
Your approach seems fine, and it’s pretty close to what
CryptoConfig
offers:Care to share more information or better, write a sample about how to achieve the desired result without the suggested APIs?