AssemblyHashAlgorithm Enumeration

Microsoft Silverlight will reach end of support after October 2021. Learn more.

Specifies all the hash algorithms used for hashing files and for generating the strong name.

Namespace:  System.Configuration.Assemblies
Assembly:  mscorlib (in mscorlib.dll)

Syntax

'Declaration
<ComVisibleAttribute(True)> _
Public Enumeration AssemblyHashAlgorithm
[ComVisibleAttribute(true)]
public enum AssemblyHashAlgorithm

Members

Member name Description
Supported by Silverlight for Windows PhoneSupported by Xbox 360 None A mask indicating that there is no hash algorithm. If you specify None for a multi-module assembly, the common language runtime defaults to the SHA1 algorithm, because multi-module assemblies have to generate a hash.
Supported by Silverlight for Windows PhoneSupported by Xbox 360 MD5 A mask used to retrieve the MD5 message-digest algorithm. MD5 was developed by Rivest in 1991. It is basically MD4 with safety-belts; although it is slightly slower than MD4, it helps provide better security. The algorithm consists of four distinct rounds, which have a slightly different design from that of MD4. Message-digest size, as well as padding requirements, remain the same.
Supported by Silverlight for Windows PhoneSupported by Xbox 360 SHA1 A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.

Remarks

A hash function H is a transformation that takes an input m and returns a fixed-size string, which is called the hash value h (that is, h = H (m)). Hash functions with just this property have a variety of general computational uses, but when employed in cryptography, the hash functions are usually chosen to have some additional properties.

The basic requirements for a cryptographic hash function are as follows:

  • The input can be of any length.

  • The output has a fixed length.

  • H (x) is relatively easy to compute for any given x.

  • H (x) is one-way.

  • H (x) is collision-free.

The hash value represents concisely the longer message or document from which it was computed; this value is called the message digest. You can think of a message digest as a digital fingerprint of the larger document. Examples of well-known hash functions are MD2 and and SHA.

Version Information

Silverlight

Supported in: 5, 4, 3

Silverlight for Windows Phone

Supported in: Windows Phone OS 7.1, Windows Phone OS 7.0

XNA Framework

Supported in: Xbox 360, Windows Phone OS 7.0

Platforms

For a list of the operating systems and browsers that are supported by Silverlight, see Supported Operating Systems and Browsers.