About Encryption

Navigation:  EDI Exchange > Using Encryption >

About Encryption

Previous pageReturn to chapter overviewNext page

Background

EDI Exchange supports the Private Key Infrastructure (PKI) encryption method. This type of encryption is the most accepted method of protecting EDI Files from being pried upon by unauthorized persons. In general terms, public-key encryption is a cryptographic technique that enables users to securely communicate through an insecure public network, verifying the identity of a user via digital signatures. Read more in Private Key Infrastructure.

 

A public-key infrastructure is a system for the creation, storage, and distribution of digital certificates, which is used to verify that a particular public key belongs to a specific entity. The public-key infrastructure creates digital certificates that map public keys to entities, securely stores these certificates in a central repository, and revokes them if needed. A public-key infrastructure consists of:

oA certificate authority (CA) that both issues and verifies the digital certificates,

oA registration authority to verify the identity of users requesting information from the CA,

oA central directory as a secure location to store and index keys, and

oA certificate management system.

 

EDI Exchange relies on other software to establish public-key infrastructure, using only the capabilities of these programs through their Application Programming Interface (API). You need to separately install either PGP Desktop or the open-source GPG4Win programs and set them up with the public keys of your Trading Partners and your private key.