![]() |
![]() |
|
|
Writing Security Code to Protect Data Integrity and Privacy
Public key security comprises end-to-end digital signing and data encryption. Both features are supported by BEA Tuxedo ATMI functions. ATMI applications protected by public key security are much safer for use across the Internet than programs in which this type of security is not used.
The capabilities that make end-to-end digital signing and data encryption possible are message-based digital signature and message-based encryption. Both capabilities are built upon the PKCS-7 standard, which is one of a set of Public-Key Cryptography Standards (PKCS) developed by RSA Laboratories in cooperation with several other leading communications companies.
Message-based digital signature ensures data integrity and non-repudiation by having the sending party bind proof of its identity to a specific message buffer. Message-based encryption protects the confidentiality of messages; only parties for whom messages are intended can decrypt and read them.
Because the unit of digital signing and encryption is an ATMI message buffer, both capabilities are compatible with existing ATMI programming interfaces and communication paradigms. It is possible for a message buffer to be both signed and encrypted. There is no required relationship between the number of digital signatures and the number of encryption envelopes associated with a message buffer.
Note: Each encryption envelope identifies a recipient of the message, and contains information needed by the recipient to decrypt the message.
ATMI Interface for Public Key Security
The ATMI interface for public key security is a compact set of functions used to:
The ATMI interfaces for public key security are available in both C and COBOL implementations. The ATMI COBOL language binding, however, does not support message buffers; thus, explicit signature, encryption, and query operations on individual buffers cannot be used in a COBOL application. However, key management interfaces do have a COBOL language binding, which enables signature generation in the AUTOSIGN mode and encryption-envelope generation in the AUTOENCRYPT mode. All operations related to automatic signature verification or automatic decryption apply to COBOL client and server processes.
Note: The COBOL TPKEYDEF record is used to manage public-private keys for performing message-based digital signature and encryption operations. See "COBOL Language ATMI Return Codes and Other Definitions" in the introduction part of the BEA Tuxedo ATMI COBOL Function Reference for a description of the TPKEYDEF record.
The following tables summarize the ATMI interfaces for public key security. Each function is also documented in the BEA Tuxedo ATMI C Function Reference and the BEA Tuxedo ATMI COBOL Function Reference.
Recommended Uses of Public Key Security
See Also
![]() |
![]() |
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|