Solved

keytool and private and public keys

Posted on 2014-04-11
1
248 Views
Last Modified: 2014-04-11
If I have the following 2 commands

keytool -genkey -alias First_Java_Cert -keyalg RSA -keystore /home/ssl/keystore.jks -storepass passw0rd
-dname "CN=first, O=IBM, C=GB" -keypass passw0rd

keytool -genkey -alias Second_Cert -keyalg RSA -keystore /home/ssl/keystore.jks -storepass passw0rd
-dname "CN=second, O=IBM, C=GB" -keypass passw0rd

Open in new window


I created 2 certs with 2 keys.  I will use one as private and another as public

What exactly makes the private and public keys as defined above mathametically simular.  They do not seem to be based on a string  or anything else that would indicate they are mathematically linked.  Is it simply because they came from the same keytool instance ?
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39994646
they aren't linked. you just generated two keypairs, one called First_Java_Cert and one called Second_Cert - two secret and two public keys in all.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Endpoint security products 4 44
Virus Kronos 4 68
Getting EventID 4625 logon failures 18 83
Azure network security group 2 34
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now