Using Encryption and Decryption
Encryption is the process of encoding the data in such a way that it can be read only by the authorized users. The purpose of encryption is to prevent third parties from recovering the original data. In an encryption process, the data (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext. This is usually done with the use of an encryption key, which specifies how the data is to be encoded. Any adversary may be able to see the ciphertext but should not be able to decode the original data. An authorized party, however, is able to decode the ciphertext using a decryption algorithm which usually requires a secret decryption key. The adversaries do not have access to this key. An encryption process usually needs a key-generation algorithm to randomly produce keys.
Adeptia enables you to apply encryption and decryption to the source and target files being transported via Adeptia Server. This enhances the security of the file being transported. To use encryption and decryption in Adeptia Suite, a new feature Data Security has been added in Adeptia Suite. You can now encrypt the source file to be sent and in the similar way, you can decrypt an encrypted file received via Adeptia Server.
Following are the major subsections:
Section Name | Description |
---|---|
Key Manager | Introduction to Key Manager. Step-by-step instructions to create Key Manager activity and how to import key or key ring into your Key Manager are also provided. |
Data Security | Step-by-step instructions to create Data Security. |
Sample Process Flow | An example to encrypt and decrypt a source file of a sample process flow. |