Key Encryption

Key Encryption of Data

Encrypt and Decrypt Data with the eiConsole’s Encryption and Decryption Processors

The Encryption and Decryption Processors in the eiPlatform and eiConsole provide a number of mechanisms that allow you to encrypt and decrypt data. As with all the components of the eiConsole, the user is presented with a graphical interface with easy to configure panels. To configure the Encryption and Decryption Processors on the Processor Configuration tab, the user clicks the Processor Type drop-down and in the example below, select Asymmetric Decryption.

Encryption and Decryption Processor Type Selection

Next name this Processor: Decrypt and select Add.

Encryption and Decryption Processor Name

The Processor will now appear on the main grid with the Basic set of configuration items.

Encryption and Decryption Processors Configuration Panel

Then you will be asked to provide the PrivateKey file used to decrypt the data and the PrivateKey password that’s used to protect the PrivateKey. If you would like to verify the signature with which the PrivateKey was signed, click the Verify signature checkbox and specify the PublicKey. The Private and PublicKey files are typically placed underneath the route folder. The paths entered in these text boxes will be relevant to that folder, or may also be an absolute path to the file route system.

Encryption and Decryption Processors Password Panel

Next, choose to add a Processor and select Asymmetric Encryption.

Asymmetric Encryption Selection in Processor Drop-Down

Name the Processor: Encrypt and select Add.

Encryption and Decryption Processors Name Processor Panel

Select the Processor that you just added from the Processor Configuration screen and a set of Basic configuration items will appear. This will allow you to choose the Encryption algorithm (CAST5, BlowFish, Triple-DES and IDEA).

Encryption and Decryption Processors Select Processor Panel

Add the name of the file once it’s encrypted and the PublicKey to use for the encryption. Next, choose whether or not to sign the data by using the check box next to Sign data. If signed, add where the PrivateKey file lives and the PrivateKey password.

Encryption and Decryption Processors

This is a unique website which will require a more modern browser to work! Please upgrade today!