473,386 Members | 1,828 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

Cryptography : key-storage

Hi,

I have a question regarding the RSA-crypto algorithm in .NET :

Executing the following creates a new keypair :
CspParameters param = new CspParameters();
param.KeyContainerName = "NewKeyContainer";
param.Flags = CspProviderFlags.UseMachineKeyStore;
RSACryptoServiceProvider rsaObj = new
RSACryptoServiceProvider(param);

==> but where are the keys actually stored ?
I looked for 'NewKeyContainer' in the registry but found nothing.
And when I use CspProviderFlags.UseDefaultKeyContainer where are they stored then ?

any help greatly appreciated !

Chris
************************************************** ********************
Sent via Fuzzy Software @ http://www.fuzzysoftware.com/
Comprehensive, categorised, searchable collection of links to ASP & ASP.NET resources...
Nov 17 '05 #1
0 1056

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Apple | last post by:
Hi guys, I am working on my java cryptography assignment. I am looking for the popular or the best cryptography softwares either wrote in java or not to encrypt/decrypt files using DES/RSA...
1
by: Alen Gurovic | last post by:
hello john i did not saw your messgae Now i want to set secret key but i do not know how need help with that code In sub crypt encrypt text and that is ok I don't know how to set .key...
3
by: Tom | last post by:
Hi, I have a project involves in file compression and encryption (generate asymmetric key for file transfer). Which API should I use in C++? Which good book or online material for this...
10
by: Alejandro Castañaza | last post by:
Hi. I'm writing a program, and I need to send confidential data through the network, so I decided to use encryption, using the System.Security.Cryptography namespace. I'm using the sockets...
3
by: Nerd | last post by:
If I write a method using dotnet's cryptography libraries and use it for encryption in my application. How can other applications decrypt these messages. The other applications will be developed in...
1
by: Nerd | last post by:
I am trying cryptography in dotnet using the System.Security.Cryptography namespaces. I have a couple of questions 1. If I use SymmetricalAlgorithm RijndaelManaged as the algorithm and if I...
1
by: Abhi | last post by:
Hi I have built an application that uses Cryptography Application block 2.0, It runs fine on my machine. Now i copy this application the complete debug folder along with .config and .key file to...
1
by: Eric Simmons | last post by:
Hello, I am trying to run a .NET 2.0 application that I developed and I am getting the following error: Key not valid for use in specified state I am attempting to retrieve the...
0
by: johnlim20088 | last post by:
Hi, Currently I m doing a encryption with Microsoft Enterprise Enterlibrary Configuration. I does generated the encrypt and decrypt single string. I follow all the step, in creating...
1
by: =?Utf-8?B?QnJpYW4gTmllbHNlbg==?= | last post by:
Hi I'm trying to use the Cryptography application block within a web application and have encountered a problem that I hope you can help resolve. 1. When I create a key file through...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.