key-management Questions
1
I used Openssl to create a PKCS12 .p12 container storing a private key, server certificate and a CACertificate (Self signed) and I was able to export/parse the same successfully.
But I want to kn...
Olaolaf asked 17/8, 2018 at 3:46
3
Solved
Is there any point in using Azure Key Vault over App Configuration?
Yes, yes, I know - they are complimentary, key vault for secrets, app config for... well, app config.
But, considering they are b...
Haggar asked 27/5, 2021 at 12:29
5
Solved
ssh-add -l displays that I have 3 RSA keys added to my SSH agent.
ssh-add -L displays those public keys.
How do I get the private keys as well, so that I can save them to a file? Or is it by desi...
Kittrell asked 4/6, 2010 at 17:45
2
Solved
If I write a google apps script, and within the script I need to invoke third party APIs or make database calls, what is the appropriate way of managing secret API keys and passwords?
Is there any...
Elliellicott asked 7/11, 2018 at 20:51
5
Solved
My task is the following:
Retrieve my public and private key from the keystore I created.
Use these keys to encrypt a paragraph using my RSA 2048-bit public key.
Digitally sign the result using t...
Opsis asked 6/11, 2013 at 9:24
1
This issue only comes when i deploy the ASP .NET Core 2.1 Web App on shared hosting. I am using Azure Key vault with PersistKeysToFileSystem.
Web App is working good on my development machine and ...
Ivied asked 18/2, 2019 at 15:37
2
Solved
How can I import a .p12 certificate from the classpath into the java keystore? First I used the InstallCert https://code.google.com/p/java-use-examples/source/browse/trunk/src/com/aw/ad/util/Instal...
Andie asked 23/7, 2014 at 13:3
1
We are implementing safety-critical system, where the FIPS 140-2 compliant HSM (hardware security module) is required to generate and store key material, perform encryption/decryption and run custo...
Club asked 20/10, 2018 at 6:47
1
Solved
i want to encrypt my RDS instance from Amazon Web Service but i dont know the explanation of the pricing.
It says that each API request of AWS Key Management Service costs $0.03 per 10,000 request...
Emrich asked 15/3, 2018 at 16:56
3
Solved
If I sign a git commit with an OpenPGP key that has an expiration date, what does that mean for people looking at that commit after the expiration date? Should all keys used for commit signing like...
Cryolite asked 20/7, 2016 at 17:14
3
Solved
I want to store some small but critical piece of information such as AES keys in my Android application. What would be the recommended way to do this? I do not want to hardcode keys as part of my a...
Cassaundra asked 27/7, 2010 at 0:11
6
I am researching Key Management Solutions in order to become PCI compliant. I have spoken to a number of vendors in the arena, and while I like their products, the cost is beyond my budget. I...
Misericord asked 14/11, 2012 at 17:55
1
Solved
I am trying to understand whether .pfx file may contain multiple private keys or not.
In case there are several sets of certificates and their private keys how they can be found in KeyStore? By us...
Dispirited asked 16/4, 2015 at 11:7
2
Solved
I'm tasked with implementing a decryption functionality against a device using the DUKPT protocol/scheme/algorithm.
The encryption algorithm itself is just DESede which is easy to work with...
Haldas asked 30/3, 2012 at 18:45
2
Solved
I have a 128 bit encryption key that I would like to break up into three parts that when XOR'ed together reproduce the key.
How do I do this?
Orientalism asked 13/7, 2012 at 19:47
1
Solved
I have a RSA public key in PEM format + PKCS#1(I guess):
-----BEGIN RSA PUBLIC KEY-----
MIGJAoGBAJNrHWRFgWLqgzSmLBq2G89exgi/Jk1NWhbFB9gHc9MLORmP3BOCJS9k
onzT/+Dk1hdZf00JGgZeuJGoXK9PX3CIKQKRQRHpi5e...
Nudd asked 13/5, 2012 at 3:47
4
Solved
Which route to take, whats the pros and cons, which is more secure..
1) Generate AES key, encrypt the data with it and then encrypt the AES key with RSA, save the encrypted data and encrypted AES ...
Papen asked 11/4, 2011 at 10:32
2
Solved
Has anyone got practical experience or a reference for a scheme that implements a key management scheme that would comply with the PCI DSS security standard?
There are obviously quite a few impleme...
Zarf asked 17/10, 2009 at 23:57
5
Solved
Suppose that a group wants to encrypt some information, then share the encryption key among the group members in a way that requires the consensus of the group to decrypt the information. I'm inter...
Messier asked 21/9, 2008 at 19:6
3
Solved
I was reading this:
http://msdn.microsoft.com/en-us/library/tswxhw92(VS.80).aspx
The first sentence says: "Asymmetric private keys should never be stored verbatim or in plain text on the local ...
Tovatovar asked 15/6, 2009 at 10:21
1
© 2022 - 2024 — McMap. All rights reserved.