Solved

CMS vs pkcs12

Posted on 2014-04-13
5
592 Views
Last Modified: 2014-04-14
What is CMS,

What is pkcs12

What is the difference
0
Comment
Question by:Anthony Lucia
  • 3
  • 2
5 Comments
 

Author Comment

by:Anthony Lucia
ID: 39997981
Actuall, I think I should have phrased it this way

what is the difference between

jks 

pkcs 

p12 / pfx 

CMS

Open in new window

0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 500 total points
ID: 39998565
jks - java keystore, an encrypted container for holding private keys and x509 style public certs designed by sun for the java language (and not used anywhere else)

pkcs - a series of standards by the RSA company for encryption; a full list can be found here but the tl;dr; version is
12 - standard for a container for both private key and certificate chain (encrypted) - pfx file
10 - standard for a container for a certificate signing request - csr file
7 - standard for a container for a certificate chain without private key - cer file, p7b file - OR an encrypted file/message.


p12/pfx - see above

CMS - a variant of pkcs#7 used for (mostly) S/MIME encrypted mail.
0
 
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 500 total points
ID: 39998570
Oh, and to avoid confusion - the reason #7 is both a certificate store format AND a message format is both of them are essentially the same task - a blob of data that has been digitally signed and/or encrypted.

For the cert, that is of course the various fields that make up its data, for the message, that's the message itself.
0
 

Author Comment

by:Anthony Lucia
ID: 39999070
So is a .pfx equivalent to a .jks ?
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 39999078
yes and no. They are both container formats for keys, but their file structure and usage cases are completely different. JKS is routinely used as a working keystore for java programs, PFX is largely used as a data interchange format importing and exporting from data stores.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Recommended Android live viewer for IP cam sys? 1 39
How to take over, control, & secure a network 9 82
Access 2016 5 54
Lightweight Networking 9 43
Enterprise Password Manager Suites as well as Local Password managers are covered in this article.
As a business owner, there are many things that keep you up at night. Profit margins, employee retention, human resource protocols, whether your product or service will remain competitive. When you own or manage a technology company that operates la…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question