Solved

CMS (and JKS and pkcs)

Posted on 2014-04-14
2
331 Views
Last Modified: 2014-04-15
What is CMS

... and how does it relate to pkcs and jks

Thanks
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Author Comment

by:Anthony Lucia
ID: 39999730
ok, its used for MIME encrypted email

Could someone give me a little more info ?

Thanks
0
 
LVL 29

Accepted Solution

by:
becraig earned 500 total points
ID: 39999771
CMS is primarily used for message signing as you indicated above that is the overall encapsulation of  CMS  - Cryptographic Message Syntax

As for JKS - This is a Proprietary Java key tool allowing you the option to create keypairs using the keytool functionality that comes with the Java Developers Kit.

Pkcs is a industry standard for different cryptography uses:
e.g. pkcs12 defines the format for the private key container / pfx files you would export a bundled private/public key pair to
pkcs 7 defines the standards for CMS or secure message syntax.


A lot more info at:|
http://en.wikipedia.org/wiki/PKCS
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question