Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

When to Use Public and Private Keys

When to Use Public and Private Keys

Several scenarios are listed below, each indicating the types of keys that will be needed by your organization and trading partners.
Requirement
What your organization needs
What your trading partner needs
Encrypt files, which will be sent to a trading partner
The trading partner’s public key to encrypt the files
Their private key to decrypt the files
Encrypt and Sign files, which will be sent to a trading partner
• The trading partner’s public key to encrypt the files
• Your organization’s private key to sign the files
• Their private key to decrypt the files
• Your organization’s public key to verify the files signatures
Decrypt files, which will be received from a trading partner
Your organization’s private key to decrypt the files
Your organization’s public key to encrypt the files
Decrypt and Verify the digital signatures of files, which files will be received from a trading partner
• Your organization’s private key to decrypt the files
• The trading partner’s public key to verify the signatures on the files
• Your organization’s public key to encrypt the files
• Their private key to sign the files

0 COMMENTS

We’d like to hear from you!