Cryptographic operations in .NET are performed by existing system libraries. As with most technological decisions, there are various pros and cons. Since the system already has a vested interest in making the cryptography libraries safe from security vulnerabilities, and already has an update mechanism that system administrators should be using, .NET gets to benefit from this reliability. Users who have requirements to use FIPS-validated algorithm implementations also get that benefit for free (when the system libraries are FIPS-validated, of course). The biggest con is that not all system libraries offer the same capabilities. While the core capabilities are present across the various platforms, there are some rough edges.
Hash algorithms, and HMAC algorithms, are very standard bytes-in-bytes-out operations. All hash algorithm (and HMAC) classes in .NET Core defer to the system libraries (including the *Managed classes).
While the various system libraries may have different performance, there should not be concerns of compatibility.
In the future there is a possibility that new hash algorithms may be added to .NET Core before one (or more) supported platforms have system support for the algorithm.
This would result in a PlatformNotSupportedException
when invoking the Create()
method for the algorithm.
The underlying ciphers and chaining are performed by the system libraries.
Cipher + Mode | Windows | Linux | macOS |
---|---|---|---|
AES-CBC | ✅ | ✅ | ✅ |
AES-ECB | ✅ | ✅ | ✅ |
3DES-CBC | ✅ | ✅ | ✅ |
3DES-ECB | ✅ | ✅ | ✅ |
DES-CBC | ✅ | ✅ | ✅ |
DES-ECB | ✅ | ✅ | ✅ |
In the future there is a possibility that new ciphers may be added to .NET Core before one (or more) supported platforms have system support for it.
This would result in a PlatformNotSupportedException
when invoking the Create()
method for the algorithm.
In the future there is a possibility that new cipher/chaining modes may be added to .NET Core before one (or more) supported platforms have system support for it.
This would result in a PlatformNotSupportedException
when invoking the CreateEncryptor()
or CreateDecryptor()
methods for the algorithm (or overloads to those methods).
In the future there is a possibility that new cipher/chaining modes may be added to .NET Core and that these new modes may not apply to all symmetric algorithms.
This would likely result in a NotSupportedException
when using the set-accessor of the Mode
property on the SymmetricAlgorithm
object, but this prediction is subject to change.
Authenticated Encryption (AE) support is provided for AES-CCM and AES-GCM via System.Security.Cryptography.AesCcm
and System.Security.Cryptography.AesGcm
, respectively.
On macOS the system libraries do not support AES-CCM or AES-GCM for 3rd party code, so the AesCcm and AesGcm classes use OpenSSL for support. Users on macOS need to obtain an appropriate copy of OpenSSL (libcrypto) for these types to function, and it must be in a path that the system would load a library from by default. Obtaining OpenSSL from a package manager, such as Homebrew, is recommended (but not required). The libcrypto.0.9.7.dylib and libcrypto.0.9.8.dylib libraries included in macOS are from older versions of OpenSSL, and will not be used. The libcrypto.35.dylib, libcrypto.41.dylib, and libcrypto.42.dylib are LibreSSL, and will not be used.
On Windows and Linux the implementations of AES-CCM and AES-GCM are provided by the system libraries.
AES-GCM works with 128, 192, and 256-bit keys.
The AesGcm class only supports 96-bit (12 byte) nonces.
The AesGcm class supports creating (or processing) 96, 104, 112, 120, and 128-bit (12-16 bytes) tags.
AES-CCM works with 128, 192, and 256-bit keys.
The AesCcm class supports 56, 64, 72, 80, 88, 96, and 104-bit nonces (7-13 bytes).
The AesCcm class supports creating (or processing) 32, 48, 64, 80, 96, 112, and 128-bit (4, 8, 10, 12, 14, or 16-byte) tags.
RSA key generation is performed by the system libraries, and is subject to size limitations and performance characteristics thereof. RSA key operations are performed by the system libraries, and the types of key that may be loaded are subject to system requirements.
.NET Core does not expose "raw" (unpadded) RSA operations, and .NET Core relies on the system libraries for encryption (and decryption) padding. Not all platforms support the same padding options.
Padding Mode | Windows (CNG) | Linux (OpenSSL) | macOS | Windows (CAPI) |
---|---|---|---|---|
PKCS1 Encryption | ✅ | ✅ | ✅ | ✅ |
OAEP - SHA-1 | ✅ | ✅ | ✅ | ✅ |
OAEP - SHA-2 (SHA256, SHA384, SHA512) | ✅ | ✅ | ✅ | ❌ |
PKCS1 Signature (MD5, SHA-1) | ✅ | ✅ | ✅ | ✅ |
PKCS1 Signature (SHA-2) | ✅ | ✅ | ✅ | ❓ |
PSS | ✅ | ✅ | ✅ | ❌ |
Windows CAPI is capable of PKCS1 signature with a SHA-2 algorithm, but the individual RSA object may be loaded in a CSP which does not support it.
- Windows CNG is used on Windows whenever
new RSACng()
is used. - Windows CAPI is used on Windows whenever
new RSACryptoServiceProvider()
is used. - The object returned by
RSA.Create()
is internally powered by Windows CNG, but this is an implementation detail subject to change. - The
GetRSAPublicKey()
extension method for X509Certificate2 will currently always return an RSACng instance, but this could change as the platform evolves. - The
GetRSAPrivateKey()
extension method for X509Certificate2 will currently prefer an RSACng instance, but if RSACng cannot open the key RSACryptoServiceProvider will be attempted.- In the future other providers could be preferred over RSACng.
.NET Core exposes types to allow programs to interoperate with the system libraries upon which the .NET cryptography code is layered. The types involved do not translate between platforms, and should only be directly used when necessary.
Type | Windows | Linux | macOS |
---|---|---|---|
RSACryptoServiceProvider | ✅ | ❓ | ❓ |
RSACng | ✅ | ❌ | ❌ |
RSAOpenSsl | ❌ | ✅ | ❓ |
RSAOpenSsl on macOS works if OpenSSL is installed in the system and an appropriate libcrypto dylib can be found via dynamic library loading, otherwise exceptions will be thrown.
On non-Windows systems RSACryptoServiceProvider can be used for compatibility with existing programs, but a PlatformNotSupportedException
will be thrown from any method which requires system interop, such as opening a named key.
ECDSA key generation is performed by the system libraries, and is subject to size limitations and performance characteristics thereof. ECDSA key curves are defined by the system libraries, and are subject to the limitations thereof.
EC Curve | Windows 10 | Windows 7 - 8.1 | Linux | macOS |
---|---|---|---|---|
NIST P-256 (secp256r1) | ✅ | ✅ | ✅ | ✅ |
NIST P-384 (secp384r1) | ✅ | ✅ | ✅ | ✅ |
NIST P-521 (secp521r1) | ✅ | ✅ | ✅ | ✅ |
brainpool curves (as named curves) | ✅ | ❌ | ❓ | ❌ |
other named curves | ❓ | ❌ | ❓ | ❌ |
explicit curves | ✅ | ❌ | ✅ | ❌ |
Export or import as explicit | ✅ | ❌ | ✅ | ❌ |
Support for named curves was added to Windows CNG in Windows 10, and is not available in prior OSes, with the exception of the three curves which had special support in Windows 7. See CNG Named Elliptic Curves for the expected support.
Not all Linux distributions have support for the same named curves.
Exporting with explicit curve parameters requires system library support which is not available on macOS or older versions of Windows.
.NET Core exposes types to allow programs to interoperate with the system libraries upon which the .NET cryptography code is layered. The types involved do not translate between platforms, and should only be directly used when necessary.
Type | Windows | Linux | macOS |
---|---|---|---|
ECDsaCng | ✅ | ❌ | ❌ |
ECDsaOpenSsl | ❌ | ✅ | ❓ |
ECDsaOpenSsl on macOS works if OpenSSL is installed in the system and an appropriate libcrypto dylib can be found via dynamic library loading, otherwise exceptions will be raised.
ECDH key generation is performed by the system libraries, and is subject to size limitations and performance characteristics thereof.
The ECDiffieHellman class will not return the "raw" value of the ECDH computation, all returned data is done in terms of key derivation functions.
- HASH(Z)
- HASH(prepend || Z || append)
- HMAC(key, Z)
- HMAC(key, prepend || Z || append)
- HMAC(Z, Z)
- HMAC(Z, prepend || Z || append)
- Tls11Prf(label, seed)
ECDH key curves are defined by the system libraries, and are subject to the limitations thereof.
EC Curve | Windows 10 | Windows 7 - 8.1 | Linux | macOS |
---|---|---|---|---|
NIST P-256 (secp256r1) | ✅ | ✅ | ✅ | ✅ |
NIST P-384 (secp384r1) | ✅ | ✅ | ✅ | ✅ |
NIST P-521 (secp521r1) | ✅ | ✅ | ✅ | ✅ |
brainpool curves (as named curves) | ✅ | ❌ | ❓ | ❌ |
other named curves | ❓ | ❌ | ❓ | ❌ |
explicit curves | ✅ | ❌ | ✅ | ❌ |
Export or import as explicit | ✅ | ❌ | ✅ | ❌ |
Support for named curves was added to Windows CNG in Windows 10, and is not available in prior OSes, with the exception of the three curves which had special support in Windows 7. See CNG Named Elliptic Curves for the expected support.
Not all Linux distributions have support for the same named curves.
Exporting with explicit curve parameters requires system library support which is not available on macOS or older versions of Windows.
.NET Core exposes types to allow programs to interoperate with the system libraries upon which the .NET cryptography code is layered. The types involved do not translate between platforms, and should only be directly used when necessary.
Type | Windows | Linux | macOS |
---|---|---|---|
ECDiffieHellmanCng | ✅ | ❌ | ❌ |
ECDiffieHellmanOpenSsl | ❌ | ✅ | ❓ |
ECDiffieHellmanOpenSsl on macOS works if OpenSSL is installed in the system and an appropriate libcrypto dylib can be found via dynamic library loading, otherwise exceptions will be raised.
DSA key generation is performed by the system libraries, and is subject to size limitations and performance characteristics thereof.
Function | Windows CNG | Linux | macOS | Windows CAPI |
---|---|---|---|---|
Key creation (<= 1024 bits) | ✅ | ✅ | ❌ | ✅ |
Key creation (> 1024 bits) | ✅ | ✅ | ❌ | ❌ |
Loading keys (<= 1024 bits) | ✅ | ✅ | ✅ | ✅ |
Loading keys (> 1024 bits) | ✅ | ✅ | ❓ | ❌ |
FIPS 186-2 | ✅ | ✅ | ✅ | ✅ |
FIPS 186-3 (SHA-2 signatures) | ✅ | ✅ | ❌ | ❌ |
macOS seems to be capable of loading DSA keys whose size exceeds 1024-bit, but does not perform FIPS 186-3 behaviors with those keys, so the behavior of those keys is undefined.
- Windows CNG is used on Windows whenever
new DSACng()
is used. - Windows CAPI is used on Windows whenever
new DSACryptoServiceProvider()
is used. - The object returned by
DSA.Create()
is internally powered by Windows CNG, but this is an implementation detail subject to change. - The
GetDSAPublicKey()
extension method for X509Certificate2 will currently always return an DSACng instance, but this could change as the platform evolves. - The
GetDSAPrivateKey()
extension method for X509Certiicate2 will currently prefer an DSACng instance, but if DSACng cannot open the key DSACryptoServiceProvider will be attempted.- In the future other providers could be preferred over DSACng.
.NET Core exposes types to allow programs to interoperate with the system libraries upon which the .NET cryptography code is layered. The types involved do not translate between platforms, and should only be directly used when necessary.
Type | Windows | Linux | macOS |
---|---|---|---|
DSACryptoServiceProvider | ✅ | ❓ | ❓ |
DSACng | ✅ | ❌ | ❌ |
DSAOpenSsl | ❌ | ✅ | ❓ |
DSAOpenSsl on macOS works if OpenSSL is installed in the system and an appropriate libcrypto dylib can be found via dynamic library loading, otherwise exceptions will be raised.
On non-Windows systems RSACryptoServiceProvider can be used for compatibility with existing programs, but a PlatformNotSupportedException
will be thrown from any method which requires system interop, such as opening a named key.
The majority of support for X.509 certificates in .NET Core comes from system libraries.
All certificates are required to be loaded by the underlying system library to be loaded into an X509Certificate2
instance in .NET Core (or an X509Certificate
instance).
Scenario | Windows | Linux | macOS |
---|---|---|---|
Empty | ✅ | ✅ | ✅ |
One certificate, no private key | ✅ | ✅ | ✅ |
One certificate, with private key | ✅ | ✅ | ✅ |
Multiple certificates, no private keys | ✅ | ✅ | ✅ |
Multiple certificates, one private key | ✅ | ✅ | ✅ |
Multiple certificates, multiple private keys | ✅ | ❌ | ✅ |
Scenario | Windows | Linux | macOS |
---|---|---|---|
Empty | ✅ | ✅ | ❌ |
One certificate, no private key | ✅ | ✅ | ❌ |
One certificate, with private key | ✅ | ✅ | ✅ |
Multiple certificates, no private keys | ✅ | ✅ | ❌ |
Multiple certificates, one private key | ✅ | ✅ | ✅ |
Multiple certificates, multiple private keys | ✅ | ❌ | ✅ |
Ephemeral loading | ✅ | ✅ | ❌ |
macOS cannot load certificate private keys without a keychain object, which requires writing to disk.
Keychains are created automatically for PFX loading, and are deleted when no longer in use.
Since the X509KeyStorageFlags.EphemeralKeySet
option means that the private key should not be written to disk, asserting that flag on macOS results in a PlatformNotSupportedException
.
Windows and Linux both emit DER-encoded PKCS7 blobs. macOS emits indefinite-length-CER-encoded PKCS7 blobs.
On Windows the X509Store class is a representation of the Windows Certificate Store APIs, and work the same as they did on .NET Framework. On Linux the X509Store class is a projection of system trust decisions (read-only), user trust decisions (read-write), and user key storage (read-write). On macOS the X509Store class is a projection of system trust decisions (read-only), user trust decisions (read-only), and user key storage (read-write).
Scenario | Windows | Linux | macOS |
---|---|---|---|
Open CurrentUser\My (ReadOnly) | ✅ | ✅ | ✅ |
Open CurrentUser\My (ReadWrite) | ✅ | ✅ | ✅ |
Open CurrentUser\My (ExistingOnly) | ✅ | ❓ | ✅ |
Open LocalMachine\My | ✅ | CryptographicException |
✅ |
Open CurrentUser\Root (ReadOnly) | ✅ | ✅ | ✅ |
Open CurrentUser\Root (ReadWrite) | ✅ | ✅ | CryptographicException |
Open CurrentUser\Root (ExistingOnly) | ✅ | ❓ | ✅ (if ReadOnly) |
Open LocalMachine\Root (ReadOnly) | ✅ | ✅ | ✅ |
Open LocalMachine\Root (ReadWrite) | ✅ | CryptographicException |
CryptographicException |
Open LocalMachine\Root (ExistingOnly) | ✅ | ❓ | ✅ (if ReadOnly) |
Open CurrentUser\Disallowed (ReadOnly) | ✅ | ❓ | ✅ |
Open CurrentUser\Disallowed (ReadWrite) | ✅ | ❓ | CryptographicException |
Open CurrentUser\Disallowed (ExistingOnly) | ✅ | ❓ | ✅ (if ReadOnly) |
Open LocalMachine\Disallowed (ReadOnly) | ✅ | CryptographicException |
✅ |
Open LocalMachine\Disallowed (ReadWrite) | ✅ | CryptographicException |
CryptographicException |
Open LocalMachine\Disallowed (ExistingOnly) | ✅ | CryptographicException |
✅ (if ReadOnly) |
Open non-existant store (ExistingOnly) | CryptographicException |
CryptographicException |
CryptographicException |
Open CurrentUser non-existant store (ReadWrite) | ✅ | ✅ | CryptographicException |
Open LocalMachine non-existant store (ReadWrite) | ✅ | CryptographicException |
CryptographicException |
On Linux stores are created on first-write, and no user stores exist by default, so opening CurrentUser\My with ExistingOnly may fail.
On Linux the Disallowed store is not used in chain building, and attempting to add contents to it will result in a CryptographicException
being thrown.
A CryptographicException
will be thrown when opening the Disallowed store on Linux if it has already acquired contents.
The LocalMachine\Root store on Linux is an interpretation of the CA bundle in the default path for OpenSSL. The LocalMachine\Intermediate store on Linux is an interpretation of the CA bundle in the default path for OpenSSL. The CurrentUser\Intermediate store on Linux is used as a cache when downloading intermediate CAs by their Authority Information Access records on successful X509Chain builds.
On macOS the CurrentUser\My store is the user's default keychain (login.keychain, by default).
The LocalMachine\My store is System.keychain.
The CurrentUser\Root store on macOS is an interpretation of the SecTrustSettings results for the user trust domain.
The LocalMachine\Root store on macOS is an interpretation of the SecTrustSettings results for the admin and system trust domains.
The CurrentUser\Disallowed and LocalMachine\Disallowed stores are interpretations of the appropriate SecTrustSettings results for certificates whose trust is set to Always Deny.
Custom store creation on macOS with the X509Store API is supported only for CurrentUser location. It will create a new keychain with no password in the user's keychain
directory (~/Library/Keychains). To create a keychain with password a P/Invoke to SecKeychainCreate could be used. Similarly, SecKeychainOpen could be used to open keychains
in different locations. The resulting IntPtr
can be passed to new X509Store(IntPtr)
to obtain a read/write-capable store (subject to the current user's permissions).
macOS does not support Offline CRL utilization, so X509RevocationMode.Offline
is treated as X509RevocationMode.Online
.
macOS does not support a user-initiated timeout on CRL/OCSP/AIA downloading, so X509ChainPolicy.UrlRetrievalTimeout
is ignored.