473,396 Members | 1,997 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

how to use server certificate to encrypt data, then use private cert/signature to decrypt?

A book (Pro PHP Security) I read has some details about it but it is not
very clear and I need to learn more.

What I gleaned is possible in this book is that the php code can encrypt
data using the server's public key certificate before sending it to the
database. Then the user, who has a private key created from that servers's
public key, is the only one who can decrypt the data.

This is similar to the way Lotus Notes works with PKI and X.509 certs.

Any links or how-tos where I can learn more is MUCH appreciated!
Aug 10 '06 #1
1 2135
Notgiven wrote:
A book (Pro PHP Security) I read has some details about it but it is not
very clear and I need to learn more.

What I gleaned is possible in this book is that the php code can encrypt
data using the server's public key certificate before sending it to the
database. Then the user, who has a private key created from that
servers's public key, is the only one who can decrypt the data.

This is similar to the way Lotus Notes works with PKI and X.509 certs.
This is exactly the same as how Lotus Notes works with PKI and x509 certs.
>
Any links or how-tos where I can learn more is MUCH appreciated!
OMG, is Google down?

Try the SSL certificates Howto, and the SSL functions in the PHP manual.

C.
Aug 10 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: wqhdebian | last post by:
As far as I know,when encrypt or decrypt ,a key must first be got,and the key is first generate by a tool or from SecurityRandom,that means I can not generate the same key with the same input.Does...
1
by: Leandro H. Delamare | last post by:
Hello Group.. Someone have a sample to how crypt a string using Crypto API with digital certificate ? If someone have a sample and can send to me :) Best Regards Leandro Delamare
4
by: Hrvoje Voda | last post by:
Does anyone knows a good example of how to encrypt/decrypt a string? Hrcko
8
by: Lenn | last post by:
Hello, I've been struggling with this for couple of days now. All I want to do is to enable SSL protocol on the webserver. I want to be able to generate and sign my own certificates. I used...
0
by: Waldek | last post by:
Anybody knows how access private key X509Certificate from CertificateStore (Microsoft.Web.Services2.Security.X509.X509CertificateStore namespace) to encrypt/decrypt data. Below code in...
10
by: Niyazi | last post by:
Hi, I developed an application and I am using SQL Server 2000 developer edition. I create my database and I have also created tbl_USER table. I have an ID, RealName, UserName, and UserPassword...
7
by: jtfaulk | last post by:
I need to encode some information on the server side using ASP.NET with C#; sending via HTTP to a client side application, that needs to be decoded in an MFC C++ application. I'm not sure if I...
8
by: Daniel Crespo | last post by:
Hello everybody, I'm trying to implement a secure xmlrpc server with basis on http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/496786 recipe. The thing that I'm concerned about is how can...
5
by: jitsu | last post by:
Hi all, I have a problem. I need to connect to Web Server, send a xml string (query) to it and receive another xml string (result). I have the location of the Web Server like:...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.