
Public key encryption
Public key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to
anyone. Both the public key and the private key are mathematically
linked; data encrypted with the public key can only be decrypted with the private key and data signed with the private key can only be verified with the public
key. The public key can be made available to anyone; this key is used for encrypting data to be sent to the keeper of the private
key. A public key is easy to distribute because it doesn't have to be
secured. Public-key algorithms can be used to create digital signatures to verify the identity the sender of
data.
Digital signatures
Digital signatures authenticate the identity of a sender and protect the integrity of data. Public-key algorithms can also be used to form digital signatures. This is based on a mathematical transform that combines the private key with the data to be signed in such a way
that:
-
Only someone possessing the private key could have created the digital
signature.
-
Anyone with access to the corresponding public key can verify the digital
signature.
-
Any modification of the signed data invalidates the digital
signature.


DHCrypto
Using DHCrypto COM module in Visual Basic or ASP program you can:
-
Create signature key pair
-
Export public or private key
-
Import public or private key
-
Sign data
-
Verify sign
-
Create private certificate
-
Verify private certificate
-
Use 128-1024 bit key
DHCrypto (Windows NT, Windows 2000) uses Microsoft Crypto Provider and MS CryptoAPI
interface.
|