Generating keys and certificates. How to generate keys and certificates. If you generate an ECDSA key, you must define the elliptic curve to use to generate the ECDSA keys. When the action creates a self-signed certificate, you can use this certificate-key pair for the.
usingSystem; |
usingSystem.Text; |
usingNethereum.Hex.HexConvertors.Extensions; |
usingNethereum.Signer; |
usingNethereum.Util; |
usingNethereum.Signer.Crypto; |
classECDSASecp256k1Example |
{ |
staticvoidMain() |
{ |
//var privKey = EthECKey.GenerateKey(); |
varprivKey=newEthECKey('97ddae0f3a25b92268175400149d65d6887b9cefaf28ea2c078e05cdc15a3c0a'); |
byte[] pubKeyCompressed=newECKey(privKey.GetPrivateKeyAsBytes(), true).GetPubKey(true); |
Console.WriteLine('Private key: {0}', privKey.GetPrivateKey().Substring(4)); |
Console.WriteLine('Public key: {0}', privKey.GetPubKey().ToHex().Substring(2)); |
Console.WriteLine('Public key (compressed): {0}', pubKeyCompressed.ToHex()); |
Console.WriteLine(); |
stringmsg='Message for signing'; |
byte[] msgBytes=Encoding.UTF8.GetBytes(msg); |
byte[] msgHash=newSha3Keccack().CalculateHash(msgBytes); |
varsignature=privKey.SignAndCalculateV(msgHash); |
Console.WriteLine('Msg: {0}', msg); |
Console.WriteLine('Msg hash: {0}', msgHash.ToHex()); |
Console.WriteLine('Signature: [v = {0}, r = {1}, s = {2}]', |
signature.V[0] -27, signature.R.ToHex(), signature.S.ToHex()); |
Console.WriteLine(); |
varpubKeyRecovered=EthECKey.RecoverFromSignature(signature, msgHash); |
Console.WriteLine('Recovered pubKey: {0}', pubKeyRecovered.GetPubKey().ToHex().Substring(2)); |
boolvalidSig=pubKeyRecovered.Verify(msgHash, signature); |
Console.WriteLine('Signature valid? {0}', validSig); |
} |
} |
<ProjectSdk='Microsoft.NET.Sdk'> |
<PropertyGroup> |
<OutputType>Exe</OutputType> |
<TargetFramework>netcoreapp2.0</TargetFramework> |
</PropertyGroup> |
<ItemGroup> |
<PackageReferenceInclude='Nethereum.Signer'Version='2.4.0' /> |
</ItemGroup> |
</Project> |
Provides a Cryptography Next Generation (CNG) implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA).
The following example shows how to use the ECDsaCng class to sign a message and how to use the signature to verify that the message has not been altered.
This class should only be used directly when doing platform interop with the Windows CNG library.When platform interop is not needed, you should use the ECDsa.Create factory methods instead of a specific derived implementation.
ECDsaCng() | Initializes a new instance of the ECDsaCng class with a random key pair. |
ECDsaCng(CngKey) | Initializes a new instance of the ECDsaCng class by using the specified CngKey object. |
ECDsaCng(ECCurve) | Initializes a new instance of the ECDsaCng class whose public/private key pair is generated over the specified curve. |
ECDsaCng(Int32) | Initializes a new instance of the ECDsaCng class with a specified target key size. |
KeySizeValue | Represents the size, in bits, of the key modulus used by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm) |
LegalKeySizesValue | Specifies the key sizes that are supported by the asymmetric algorithm. (Inherited from AsymmetricAlgorithm) |
HashAlgorithm | Gets or sets the hash algorithm to use when signing and verifying data. |
Key | Gets or sets the key to use when signing and verifying data. |
KeyExchangeAlgorithm | Gets the name of the key exchange algorithm. (Inherited from ECDsa) |
KeySize | Gets or sets the size, in bits, of the key modulus used by the asymmetric algorithm. |
LegalKeySizes | Gets the key sizes, in bits, that are supported by the KeySize property setter. |
SignatureAlgorithm | Gets the name of the signature algorithm. (Inherited from ECDsa) |
Clear() | Releases all resources used by the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm) |
Dispose() | Releases all resources used by the current instance of the AsymmetricAlgorithm class. (Inherited from AsymmetricAlgorithm) |
Dispose(Boolean) | Releases the unmanaged resources used by the AsymmetricAlgorithm class and optionally releases the managed resources. (Inherited from AsymmetricAlgorithm) |
Equals(Object) | Determines whether the specified object is equal to the current object. (Inherited from Object) |
ExportECPrivateKey() | Exports the current key in the ECPrivateKey format. (Inherited from ECDsa) |
ExportEncryptedPkcs8PrivateKey(ReadOnlySpan<Byte>, PbeParameters) | Exports the current key in the PKCS#8 EncryptedPrivateKeyInfo format with a byte-based password. (Inherited from AsymmetricAlgorithm) |
ExportEncryptedPkcs8PrivateKey(ReadOnlySpan<Char>, PbeParameters) | Exports the current key in the PKCS#8 EncryptedPrivateKeyInfo format with a char-based password. (Inherited from AsymmetricAlgorithm) |
ExportExplicitParameters(Boolean) | Exports the key and explicit curve parameters used by the Elliptic curve cryptography (ECC) object into an ECParameters object. |
ExportParameters(Boolean) | Exports the key used by the Elliptic curve cryptography (ECC) object into an ECParameters object. If the key was created as a named curve, the Curve field contains named curve parameters; otherwise, it contains explicit parameters. |
ExportPkcs8PrivateKey() | Exports the current key in the PKCS#8 PrivateKeyInfo format. (Inherited from AsymmetricAlgorithm) |
ExportSubjectPublicKeyInfo() | Exports the public-key portion of the current key in the X.509 SubjectPublicKeyInfo format. (Inherited from AsymmetricAlgorithm) |
FromXmlString(String) | This method is not implemented. |
FromXmlString(String, ECKeyXmlFormat) | Deserializes the key information from an XML string by using the specified format. |
GenerateKey(ECCurve) | Generates a new ephemeral public/private key pair for the specified curve, replacing the current key. |
GetHashCode() | Serves as the default hash function. (Inherited from Object) |
GetType() | Gets the Type of the current instance. (Inherited from Object) |
HashData(Byte[], Int32, Int32, HashAlgorithmName) | When overridden in a derived class, computes the hash value of the specified portion of a byte array by using the specified hashing algorithm. (Inherited from ECDsa) |
HashData(Stream, HashAlgorithmName) | When overridden in a derived class, computes the hash value of the specified binary stream by using the specified hashing algorithm. (Inherited from ECDsa) |
ImportECPrivateKey(ReadOnlySpan<Byte>, Int32) | Imports the public/private keypair from an ECPrivateKey structure, replacing the keys for this object. (Inherited from ECDsa) |
ImportEncryptedPkcs8PrivateKey(ReadOnlySpan<Byte>, ReadOnlySpan<Byte>, Int32) | Imports the public/private keypair from a PKCS#8 EncryptedPrivateKeyInfo structure after decrypting with a byte-based password, replacing the keys for this object. (Inherited from ECDsa) |
ImportEncryptedPkcs8PrivateKey(ReadOnlySpan<Char>, ReadOnlySpan<Byte>, Int32) | Imports the public/private keypair from a PKCS#8 EncryptedPrivateKeyInfo structure after decrypting with a char-based password, replacing the keys for this object. (Inherited from ECDsa) |
ImportParameters(ECParameters) | Replaces the existing key that the current instance is working with by creating a new CngKey for the parameters structure. |
ImportPkcs8PrivateKey(ReadOnlySpan<Byte>, Int32) | Imports the public/private keypair from a PKCS#8 PrivateKeyInfo structure after decryption, replacing the keys for this object. (Inherited from ECDsa) |
ImportSubjectPublicKeyInfo(ReadOnlySpan<Byte>, Int32) | Imports the public key from an X.509 SubjectPublicKeyInfo structure after decryption, replacing the keys for this object. (Inherited from ECDsa) |
MemberwiseClone() | Creates a shallow copy of the current Object. (Inherited from Object) |
SignData(Byte[]) | Generates a signature for the specified data. |
SignData(Byte[], HashAlgorithmName) | Computes the hash value of the specified byte array using the specified hash algorithm and signs the resulting hash value. (Inherited from ECDsa) |
SignData(Byte[], Int32, Int32) | Generates a digital signature for the specified length of data, beginning at the specified offset. |
SignData(Byte[], Int32, Int32, HashAlgorithmName) | Computes the hash value of a portion of the specified byte array using the specified hash algorithm and signs the resulting hash value. (Inherited from ECDsa) |
SignData(Stream) | Generates a signature for the specified data stream, reading to the end of the stream. |
SignData(Stream, HashAlgorithmName) | Computes the hash value of the specified stream using the specified hash algorithm and signs the resulting hash value. (Inherited from ECDsa) |
SignHash(Byte[]) | Generates a signature for the specified hash value. |
ToString() | Returns a string that represents the current object. (Inherited from Object) |
ToXmlString(Boolean) | This method is not implemented. |
ToXmlString(ECKeyXmlFormat) | Serializes the key information to an XML string by using the specified format. |
TryExportECPrivateKey(Span<Byte>, Int32) | Attempts to export the current key in the ECPrivateKey format into a provided buffer. (Inherited from ECDsa) |
TryExportEncryptedPkcs8PrivateKey(ReadOnlySpan<Byte>, PbeParameters, Span<Byte>, Int32) | Attempts to export the current key in the PKCS#8 EncryptedPrivateKeyInfo format into a provided buffer, using a byte-based password. Windows 7 Home Premium Product Key is entirely analyzed, and the working list can be downloaded from either the link is given below. Or you can merely just copy the Product key independently and check your Windows 7 high quality during installation in the. Download windows 7 home premium product key generator. (Inherited from ECDsa) |
TryExportEncryptedPkcs8PrivateKey(ReadOnlySpan<Char>, PbeParameters, Span<Byte>, Int32) | Attempts to export the current key in the PKCS#8 EncryptedPrivateKeyInfo format into a provided buffer, using a char-based password. (Inherited from ECDsa) |
TryExportPkcs8PrivateKey(Span<Byte>, Int32) | Attempts to export the current key in the PKCS#8 PrivateKeyInfo format into a provided buffer. (Inherited from ECDsa) |
TryExportSubjectPublicKeyInfo(Span<Byte>, Int32) | Attempts to export the current key in the X.509 SubjectPublicKeyInfo format into a provided buffer. (Inherited from ECDsa) |
TryHashData(ReadOnlySpan<Byte>, Span<Byte>, HashAlgorithmName, Int32) | Attempts to compute the hash value of the specified read-only span of bytes into the provided destination by using the specified hashing algorithm. (Inherited from ECDsa) |
TrySignData(ReadOnlySpan<Byte>, Span<Byte>, HashAlgorithmName, Int32) | Attempts to compute the ECDSA digital signature for the specified read-only span of bytes into the provided destination by using the specified hashing algorithm and the current key. (Inherited from ECDsa) |
TrySignHash(ReadOnlySpan<Byte>, Span<Byte>, Int32) | Attempts to compute the ECDSA digital signature for the specified read-only span of bytes representing a data hash into the provided destination by using the current key. (Inherited from ECDsa) |
VerifyData(Byte[], Byte[]) | Verifies the digital signature of the specified data. |
VerifyData(Byte[], Byte[], HashAlgorithmName) | Verifies that a digital signature is appropriate for the current key and provided data with a specified hash algorithm. (Inherited from ECDsa) |
VerifyData(Byte[], Int32, Int32, Byte[]) | Verifies a signature for the specified length of data, beginning at the specified offset. |
VerifyData(Byte[], Int32, Int32, Byte[], HashAlgorithmName) | Verifies that a digital signature is appropriate for the current key and provided portion of data with a specified hash algorithm. (Inherited from ECDsa) |
VerifyData(ReadOnlySpan<Byte>, ReadOnlySpan<Byte>, HashAlgorithmName) | Verifies that a digital signature is appropriate for the current key and provided data with a specified hash algorithm. (Inherited from ECDsa) |
VerifyData(Stream, Byte[]) | Verifies the digital signature of the specified data stream, reading to the end of the stream. |
VerifyData(Stream, Byte[], HashAlgorithmName) | Verifies that a digital signature is appropriate for the current key and provided data with a specified hash algorithm. (Inherited from ECDsa) |
VerifyHash(Byte[], Byte[]) | Verifies that a digital signature is appropriate for the current key and provided data hash. |
VerifyHash(ReadOnlySpan<Byte>, ReadOnlySpan<Byte>) | Verifies that a digital signature is appropriate for the current key and provided data hash. (Inherited from ECDsa) |
IDisposable.Dispose() | For a description of this member, see Dispose(). (Inherited from AsymmetricAlgorithm) |