Solved

Creating a new .keystore and .cer in the process of Encryption

Posted on 2011-02-11
1
513 Views
Last Modified: 2012-05-11
Currently I am using .keystore provided by Itext inthe process of creating an pdf encryption.
I am new to this Encryption concept.Can any one help me in how to create  our own .keystore and .cer files and use it in the encryption and decryption process of a asymmetric key cryptography.
0
Comment
Question by:mrkkishore
1 Comment
 
LVL 4

Accepted Solution

by:
hb11 earned 500 total points
ID: 34934090
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question