Solved

Private Key Password

Posted on 2006-10-27
5
200 Views
Last Modified: 2010-04-11
I have set up a application that creates a digital signature using a certificate.  I installed the certificate with the private key using certificate services.  The application seems to work as it shoud but does not ask me for the password for the private key before encryption.
0
Comment
Question by:Kevin Robinson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17828341
No, your only signing the message, your not encrypting it... http://en.wikipedia.org/wiki/Public-key_cryptography
public key digital signature — allowing anyone to verify that a message was created with a specific private key.
The public key is available for others the check that the private key created the file/message.
http://en.wikipedia.org/wiki/Public_key_certificate
-rich
0
 
LVL 3

Author Comment

by:Kevin Robinson
ID: 17832435
"No, your only signing the message"  

This is exactly what I want to do.  I want to use this signature as a replacement for a physical signature.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 17832803
The password you supply is what each of the keys derive the hash's from... when you setup, you input a password, then the private key is made based on that password, and the public key is made based on the private key. You never need a password again, just the key's.
Are you trying to sign emails? Try GPG http://www.gnupg.org/(en)/documentation/guides.html
http://www.experts-exchange.com/Security/Q_22041521.html#17831350
-rich
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question