The following tables list the members exposed by the Keystone.Enigma type.
Name | Description | |
---|---|---|
![]() |
AsymmetricEncryption | Preserves data integrity by applying on it RSA based asymmetric encryption/decryption algorithms. |
![]() |
CryptographicStrategy | The base class of any receiver of a EnigmaController cryptographic operation requests, and whose purpose is to preserve data integrity when exchanged. |
![]() |
EncryptionStrategy | The base class of any receiver of a EnigmaController encryption operation requests, and whose purpose is to preserve data confidentiality when exchanged. |
![]() |
EnigmaController | Offers an unified access point to activate methods that strengthen data integrity by applying state of the industry confidentiality and authenticity cryptographic techniques. |
![]() |
Hashing | Aids to verify data authenticity by applying on it any HashAlgorithm. |
![]() |
HashingStrategy | The base class of any receiver of a EnigmaController hashing operation requests, and whose purpose is to aid to verify data authenticity. |
![]() |
SymmetricEncryption | Preserves data integrity by applying on it any SymmetricAlgorithm encryption/decryption operations. |
![]() |
SymmetricEncryptionKey | Represents a symmetric encryption secret key. |