Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

keytool and private and public keys

Posted on 2014-04-11
1
256 Views
Last Modified: 2014-04-11
If I have the following 2 commands

keytool -genkey -alias First_Java_Cert -keyalg RSA -keystore /home/ssl/keystore.jks -storepass passw0rd
-dname "CN=first, O=IBM, C=GB" -keypass passw0rd

keytool -genkey -alias Second_Cert -keyalg RSA -keystore /home/ssl/keystore.jks -storepass passw0rd
-dname "CN=second, O=IBM, C=GB" -keypass passw0rd

Open in new window


I created 2 certs with 2 keys.  I will use one as private and another as public

What exactly makes the private and public keys as defined above mathametically simular.  They do not seem to be based on a string  or anything else that would indicate they are mathematically linked.  Is it simply because they came from the same keytool instance ?
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39994646
they aren't linked. you just generated two keypairs, one called First_Java_Cert and one called Second_Cert - two secret and two public keys in all.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question