What is the "dssenh.dll" ?
Our database contains 423 different files for filename dssenh.dll . You can also check most distributed file variants with name dssenh.dll. This files most often belongs to product Microsoft® Windows® Operating System. and were most often developed by company Microsoft Corporation. This files most often have description Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider. Agregate rating is 5(5) stars - based on 2 reviews.This file is Dynamic-link Library. This library can be loaded and executed in any running process.
File details of most used file with name "dssenh.dll"
- Product:
- Microsoft® Windows® Operating System
- Company:
- Microsoft Corporation
- Description:
- Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider
- Version:
- 6.1.7600.16385
- MD5:
- f11a57e91fdaecfb41a5cb21eb1ebc8e
- SHA1:
- e395683841b965d1f224413f2e3339091f51add8
- SHA256:
- 904da963f2274adf521660e3131dac781e59c6faeb393e57802a3b5638c09283
- Size:
- 190880
- Directory:
- C:\Windows\System32
- Operating System:
- Windows 7
- Occurence:
- High
- Digital Signature:
- Microsoft Windows
Is the library "dssenh.dll" Safe or Threat ?
100% of reviewed files are marked as System file.
User Reviews of the "dssenh.dll"
Reviews for all files with name "dssenh.dll"
-
SAFErating from user kajmik for file C:\Windows\System32\dssenh.dll (Variant: 583522)
Windows Server 2003 R2.
-
SAFErating from user Don't PlaY for file C:\Windows\System32\dssenh.dll (Variant: 502512)
The software Windows Server 2003 Enhanced DSS and Diffie-Hellman Cryptographic Provider is a general-purpose, cryptographic module. This CSP runs on a single DLL, the dssenh.dll module, which encapsulates several different cryptographic algorithms. Given that it is a FIPS 140-2 Level 1 compliant cryptographic module, the DSSENH offers software developers an easy-to-use cryptographic service that passes government-imposed export restrictions on cryptography. The dssenh.dll file implements the Diffie-Hellman key exchange, hashing or message digests, data signing and signature verification. The SHA and DSA algorithms are adapted to process application requests.