System Administration → Cryptography

Cryptography

Cryptography is a technique for ensuring secured-data transfers between the source and destination. To transfer data, two techniques are used.

  1. Encryption: The process of translating plain text into cipher text (i.e., plain text is turned into something unreadable) – This is handled by the sender.
  2. Decryption: The process of converting (cipher) text back into plain text (i.e., cipher text is turned into something readable) This is handled by the receiver.

Cryptography Page Load
[Fig. 1]

Two Types of Encryption and Decryption:

  1. Symmetric (AES): Requires a single key, which is known only to the authorized parties. The same key is used for encryption and decryption.

  2. Asymmetric (PGP): Requires a pair of keys (public & private). The public key is used for encryption, and the private key is used for decryption. The private key is only available to the person the public key belongs to.

Cryptography Summary Table

The Cryptography table displays a summary of the following information:

Search Table

Create a Key

Cryptography Create
[Fig. 2]

Field Definitions & Other Functionality

Generating Private & Public Keys

Internally, we only make use of the asymmetric PGP keys, meaning that we will generate both a public key and a private key. To create a new set of pgp keys, you will need to request them from the IT department.

For more information on how PGP keys are generated: Go Here.

View / Edit a Key