Reputation: 775
For example, Microsoft provides both SHA1Managed and SHA1CryptoServiceProvider (Unmanaged) as implementations of SHA1.
What, if any, are the advantages and disadvantages of using the unmanaged implementation instead of the managed implementation?
Thanks for any help!
Update:
The answers from SLaks, Chochos, and fejesjoco were very useful, but I chose SLaks because he asked me to. :-)
As a summary, choose:
Upvotes: 0
Views: 209
Reputation: 5159
If you have a hardware cryptographic accelerator, you'll need to use an unmanaged implementation to access it, since the managed implementatios won't use it.
Upvotes: 1
Reputation: 11903
I'd assume the managed implementation is guaranteed to be platform independent.
Upvotes: 0