Î ęîěďŕíčč

DataHouse designs solutions for wild fields of business, some typical solutions are presented here...

We can implement any concept to your benefit and our applications are based on the latest IT technologies. We deliver turnkey solutions, implementation support and maintenance, see our specialization...


Public key encryption
Public key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone. Both the public key and the private key are mathematically linked; data encrypted with the public key can only be decrypted with the private key and data signed with the private key can only be verified with the public key. The public key can be made available to anyone; this key is used for encrypting data to be sent to the keeper of the private key. A public key is easy to distribute because it doesn't have to be secured. Public-key algorithms can be used to create digital signatures to verify the identity the sender of data.

Digital signatures
Digital signatures authenticate the identity of a sender and protect the integrity of data. Public-key algorithms can also be used to form digital signatures. This is based on a mathematical transform that combines the private key with the data to be signed in such a way that:

  • Only someone possessing the private key could have created the digital signature.

  • Anyone with access to the corresponding public key can verify the digital signature.

  • Any modification of the signed data invalidates the digital signature. 

Using DHCrypto COM module in Visual Basic or ASP program you can:

  • Create signature key pair

  • Export public or private key

  • Import public or private key

  • Sign data 

  • Verify sign

  • Create private certificate

  • Verify private certificate

  • Use 128-1024 bit key

DHCrypto (Windows NT, Windows 2000) uses Microsoft Crypto Provider and MS CryptoAPI interface.








 Š   DataHouseŽ, Moscow, Russia,  2002

Contact Us