Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to generate public and private keys in PKCS # 11 with JAVA

Posted on 2010-09-15
5
Medium Priority
?
482 Views
Last Modified: 2013-12-29
Dear, good afternoon!
I need to create a simple class in Java (with a main) generating public and private keys and the record in the database using PKSC # 11.
I've read:
JavaTM PKCS # 11 Reference Guide
Java TM Cryptography Architecture
JavaTM Cryptography Extension (JCE)
however, still do not know how to do it actually. Do you have some kind of practical guide, or specific mentoring from such implementation?
What I really need to give beginning? Only with the JDK and JCE installed is enough, or should I install the SDK?
Tanks!
0
Comment
Question by:br_ms
  • 2
3 Comments
 
LVL 86

Accepted Solution

by:
CEHJ earned 1000 total points
ID: 33689462
You need something like the following. What are you going to do after you've got the key pair?

http://www.exampledepot.com/egs/java.security/GenKeyPair.html
0
 

Author Comment

by:br_ms
ID: 33694955
So I need to generate a keystore.
Well, the code you showed me I already know to generate, in fact I need to generate these keys using PKCS # 11. I need to use the OpenSC, but do not know how to do it. It seems that I have to download a configuration file, an implementation ... I'm not sure.
0
 

Author Closing Comment

by:br_ms
ID: 33824126
Thx!
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Viewers will learn about the different types of variables in Java and how to declare them. Decide the type of variable desired: Put the keyword corresponding to the type of variable in front of the variable name: Use the equal sign to assign a v…
This tutorial explains how to use the VisualVM tool for the Java platform application. This video goes into detail on the Threads, Sampler, and Profiler tabs.
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question