Solved

Private Key Password

Posted on 2006-10-27
5
197 Views
Last Modified: 2010-04-11
I have set up a application that creates a digital signature using a certificate.  I installed the certificate with the private key using certificate services.  The application seems to work as it shoud but does not ask me for the password for the private key before encryption.
0
Comment
Question by:Kevin Robinson
  • 2
5 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17828341
No, your only signing the message, your not encrypting it... http://en.wikipedia.org/wiki/Public-key_cryptography
public key digital signature — allowing anyone to verify that a message was created with a specific private key.
The public key is available for others the check that the private key created the file/message.
http://en.wikipedia.org/wiki/Public_key_certificate
-rich
0
 
LVL 3

Author Comment

by:Kevin Robinson
ID: 17832435
"No, your only signing the message"  

This is exactly what I want to do.  I want to use this signature as a replacement for a physical signature.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 17832803
The password you supply is what each of the keys derive the hash's from... when you setup, you input a password, then the private key is made based on that password, and the public key is made based on the private key. You never need a password again, just the key's.
Are you trying to sign emails? Try GPG http://www.gnupg.org/(en)/documentation/guides.html
http://www.experts-exchange.com/Security/Q_22041521.html#17831350
-rich
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question