| 1. |
How Is A Strongly-named Assembly Different From One That Is Not Strongly-named? |
|
Answer» Strong names are used to enable the stricter naming requirements associated with shared assemblies. These strong names are created by a .NET utility – sn.exe Strong names have three goals:
Strong names are IMPLEMENTED using standard public KEY cryptography. In general, the process works as follows: The author of an assembly generates a key pair (or uses an existing one), signs the file containing the manifest with the private key, and MAKES the public key available to callers. When references are made to the assembly, the caller records the public key corresponding to the private key used to generate the strong name. Weak named assemblies are not suitable to be added in GAC and shared. It is ESSENTIAL for an assembly to be strong named. Strong naming prevents tampering and enables assemblies to be placed in the GAC alongside other assemblies of the same name. Strong names are used to enable the stricter naming requirements associated with shared assemblies. These strong names are created by a .NET utility – sn.exe Strong names have three goals: Strong names are implemented using standard public key cryptography. In general, the process works as follows: The author of an assembly generates a key pair (or uses an existing one), signs the file containing the manifest with the private key, and makes the public key available to callers. When references are made to the assembly, the caller records the public key corresponding to the private key used to generate the strong name. Weak named assemblies are not suitable to be added in GAC and shared. It is essential for an assembly to be strong named. Strong naming prevents tampering and enables assemblies to be placed in the GAC alongside other assemblies of the same name. |
|