It is my understanding that strong naming creates a cryptographic Hash of the a assembly to which is used as a strong name to load the dll.
I was hoping to use this feature to detect corruption of a binary to inform the user there is a problem with the software and they need to reinstall it.
This works for some changes to the binary, however i've found modifying the binary, especially static strings within the binary, does not cause the application to report that it cannot locate a dll of the appropriate strong name.
Can anyone explain to me what data from an assembly is used to create the strong name, and why strong naming does not always detect the modification of the dll? Is there a way that i can force it to include additional information in the strong naming?
Is there a alternate way i can detect a corruption of a binary?
Cheers
Ryan