Cryptography Actions
As the Internet and other forms of electronic communication becomes more widespread, the subject of security is becoming increasingly important. One essential aspect for secure communications is that of cryptography, the science of converting data into a secret, unreadable code using an encryption algorithm. Cryptography is necessary when communicating over any unprotected medium because it not only ensures privacy and data integrity but can also be used as a form of authentication.
The three main types of cryptographic algorithms consists of Secret Key Cryptography (SKC), Public Key Cryptography (PKC) and Hash functions. Cryptography action supports all three types. includes not only those activities that perform encryption and decryption of files but a variety of others that cover a wider spectrum. These activities are capable of creating or deleting key containers, generating both public and private key files from existing key containers and digitally signing files using newly generated private keys. PGP (Pretty Good Privacy), one of the most widely used cryptography systems used on the Internet today, is also supported.
Available Activities
The list of activities for this action are arranged below in alphabetical order. For more information about a specific activity, click the associated link.
Activity |
Description |
---|---|
Creates a new Machine-Level or User-Level key container. |
|
Decrypts one or more encrypted files. |
|
Decrypts and verifies one or more files in a single automated sequence. |
|
Deletes a previously created User-Level or Machine-Level key container. |
|
Encrypts one or more files using the specified encryption method and algorithm. |
|
Encrypts and digitally signs one or more files in a single automated sequence. |
|
Generates public and private key files from the specified key container. |
|
Digitally signs a file using the specified private key(s). |
|
Verifies the signature attached to a file to validate authenticity of the sender. |