Solved

How to generate public and private keys in PKCS # 11 with JAVA

Posted on 2010-09-15
5
473 Views
Last Modified: 2013-12-29
Dear, good afternoon!
I need to create a simple class in Java (with a main) generating public and private keys and the record in the database using PKSC # 11.
I've read:
JavaTM PKCS # 11 Reference Guide
Java TM Cryptography Architecture
JavaTM Cryptography Extension (JCE)
however, still do not know how to do it actually. Do you have some kind of practical guide, or specific mentoring from such implementation?
What I really need to give beginning? Only with the JDK and JCE installed is enough, or should I install the SDK?
Tanks!
0
Comment
Question by:br_ms
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 86

Accepted Solution

by:
CEHJ earned 500 total points
ID: 33689462
You need something like the following. What are you going to do after you've got the key pair?

http://www.exampledepot.com/egs/java.security/GenKeyPair.html
0
 

Author Comment

by:br_ms
ID: 33694955
So I need to generate a keystore.
Well, the code you showed me I already know to generate, in fact I need to generate these keys using PKCS # 11. I need to use the OpenSC, but do not know how to do it. It seems that I have to download a configuration file, an implementation ... I'm not sure.
0
 

Author Closing Comment

by:br_ms
ID: 33824126
Thx!
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn about basic arrays, how to declare them, and how to use them. Introduction and definition: Declare an array and cover the syntax of declaring them: Initialize every index in the created array: Example/Features of a basic arr…
This tutorial explains how to use the VisualVM tool for the Java platform application. This video goes into detail on the Threads, Sampler, and Profiler tabs.

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question