NSign.SignatureProviders 1.0.0

There is a newer version of this package available.
See the version list below for details.
dotnet add package NSign.SignatureProviders --version 1.0.0                
NuGet\Install-Package NSign.SignatureProviders -Version 1.0.0                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="NSign.SignatureProviders" Version="1.0.0" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add NSign.SignatureProviders --version 1.0.0                
#r "nuget: NSign.SignatureProviders, 1.0.0"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install NSign.SignatureProviders as a Cake Addin
#addin nuget:?package=NSign.SignatureProviders&version=1.0.0

// Install NSign.SignatureProviders as a Cake Tool
#tool nuget:?package=NSign.SignatureProviders&version=1.0.0                

NSign.SignatureProviders

Signature providers for signing and verifying signatures with NSign. This library currently supports both asymmetric algorithms (using public-key cryptography) and symmetric algorithms (using HMAC). Signature providers typically implement both the ISigner and the IVerifier interfaces, but implementation can also be split into separate classes.

Asymmetric Signature Algorithms

Currently, the following asymmetrics signature algorithms are supported:

  • ECDSA using curve P-256 DSS and SHA-256 (ecdsa-p256-sha256 in [^1]), in class ECDsaP256Sha256SignatureProvider
  • ECDSA using curve P-384 DSS and SHA-384 (ecdsa-p384-sha384 in [^1]), in class ECDsaP382Sha384SignatureProvider
  • RSASSA-PSS using SHA-512 (rsa-pss-sha512 in [^1]) in class RsaPssSha512SignatureProvider
  • RSASSA-PKCS1-v1_5 using SHA-256 (rsa-v1_5-sha256 in [^1]) in class RsaPkcs15Sha256SignatureProvider

These signature providers can all be created by passing an instance of X509Certificate2 and having the provider extract the public key for signature verification from there. If the provider is to be used for signing, the certificate that is provided must have a private key too, otherwise signing will fail / an exception will be thrown. Naturally, the keys used in the certificate must match the key parameters/formats expected by the signature provider.

For instance, to use rsa-pss-sha512 with a PEM-encoded certificate in a file called the-cert.cer for signature verification, creating the provider as follows will do:

var provider = new RsaPssSha512SignatureProvider(
	new X509Certificate2("the-cert.cer"),
	"the-cert-key-id"))

To use rsa-pss-sha512 with a PFX file called the-cert.pfx, holding the private key for message signing, a provider can be created as follows:

var provider = new RsaPssSha512SignatureProvider(
	new X509Certificate2("the-cert.pfx", "here-goes-the-password-to-the-PFX"),
	"the-cert-key-id"))

Due to their nature, asymmetric signatures are often preferable over symmetric signatures because they do not require both the signing and verifying party to share a secret (the key). Instead, the public key can be published anywhere / through any means for verifiers to download and use.

Symmetric Signature Algorithms

Currently, the following symmetric signature algorithms are supported:

  • HMAC using SHA-256 (hmac-sha256 in [^1]), in class HmacSha256SignatureProvider

This signature provider requires the (shared) key to be provided during construction.

Further Information

See also:

[^1]: See section Signature Algorithms of HTTP Message Signatures, https://datatracker.ietf.org/doc/draft-ietf-httpbis-message-signatures/

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 is compatible.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
1.1.1 91 11/21/2024
1.1.0 629 11/12/2024
1.0.4 807 8/26/2024
1.0.3 2,165 6/17/2024
1.0.2 702 5/15/2024
1.0.1 2,084 3/20/2024
1.0.0 129 2/20/2024
0.19.3 136 2/13/2024
0.19.2 268 11/27/2023
0.19.1 661 10/9/2023
0.19.0 188 8/21/2023
0.17.0 201 5/12/2023
0.16.0 438 2/13/2023
0.15.3 347 1/19/2023
0.15.2 306 1/18/2023
0.15.1 335 1/16/2023
0.15.0 358 1/12/2023
0.10.0 464 6/8/2022
0.9.0 463 3/28/2022
0.8.3 467 3/10/2022
0.8.2 475 2/21/2022
0.8.1 436 2/21/2022
0.8.0 460 2/14/2022
0.2.0 316 1/4/2022
0.1.1 375 9/20/2021
0.1.0 343 9/17/2021