Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applications can use the CryptoAPI for the following tasks:
- Generating cryptographic keys
- Exporting cryptographic keys
- Encrypting and decrypting data
- Creating digital signatures
- Connecting to a CSP
All data encryption using CryptoAPI is performed with a symmetric algorithm, regardless of the installed CSP.
The following topics describe the elements and tasks of basic cryptography services:
See Also
Cryptography | Microsoft Cryptographic System | About Cryptographic Service Provider | Protected Store | Cryptography Security | Cryptography Registry Settings | Certificates
Send Feedback on this topic to the authors