Solved

Certificates and Keystores

Posted on 2014-07-23
1
297 Views
Last Modified: 2014-07-23
I assume the following:

I assume keystores contain a combination of either certificates or private keys

(and a certificate itself contains 1 or 2 keys)

Is this correct ?

Thanks
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 1

Accepted Solution

by:
scott green earned 500 total points
ID: 40215049
Yes the keystores can contain either certificates or private keys for data integrity or authentication.
Certificate contains a public key and identity information for authentication. They keystore can contain both, but private keys are used for encryption and certificates cannot be used where a private key is required.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question