Tag Archives: encryption

  • -

What is AS2?

Category:News Tags : 

Applicability Statement 2 (AS2) is a popular file transfer protocol that allows businesses to exchange data with their trading partners.

AS2 combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing the strengths of each of them, AS2 has become the preferred protocol in many organizations for exchanging sensitive EDI files.

AS2 messages can be compressed, signed, encrypted and sent over an SSL tunnel making the file transfers very secure. And receipts can be sent back to the sender ensuring the messages were delivered successfully. The receipts can be digitally signed and will contain a checksum value that the sender will use to verify the message received is identical to what was sent.

Message Encryption – By using the recipient’s public certificate, the AS2 message contents can be encrypted to keep the data secure. Only the recipient will be able to decrypt the contents using their private certificate.

Digital Signatures – The message can be signed using the sender’s private certificate which allows the recipient to verify the authenticity of the sender. The receipt that is sent back to the sender can also be signed to ensure the identity of the recipient’s system. These digital signatures are used for message integrity and non-repudiation of origin. They are typically used in addition to authentication using a user name, password, and/or certificate.

Compression – In order to improve transmission time, compression can be added to decrease the size of the message.

Receipt – The Message Disposition Notification (MDN, which is commonly referred to as a receipt) plays an important role in AS2 as it acknowledges that the recipient received the message. It can also be used to verify the identity of the recipient when the receipt is signed. Receipts that are sent back immediately over the same connection are referred to as a synchronous MDN. Receipts can also be sent back at a later time in asynchronous mode. This allows the recipient to process and verify the data before sending back a status to indicate if the transaction was successful.

Message Integrity Check – The recipient will calculate a checksum of the message using MD5, SHA1, or a SHA2 hashing algorithm. This value is referred to as the MIC and is shared with the sender by placing it in the receipt. The sender will calculate a checksum as well using the same algorithm. These two values are then compared to guarantee that the message sent is identical to the message that was received.

Non-repudiation of Receipt –The use of signatures on the message and receipt creates a Non-Repudiation of Receipt (NRR) event, which is considered legal proof of delivery.

Both organizations will need an AS2 solution in order to exchange data. Due to the complex nature of the AS2 protocol with encryption, signatures, and receipts; it is possible that there can be compatibility issues between two separate products. Fortunately, Drummond Group has a rigorous program that validates an AS2 product follows the RFC 4130 standard and is interoperable with other certified products. Using a Drummond Certified solution, and requiring your trading partners do as well, alleviates the challenges of AS2 and allows you to focus on the business aspects of data transfers.

GoAnywhere MFT™ is Drummond Certified™ for AS2 and supports SHA2 algorithms for stronger security, chunked transfer encoding to handle large files, multiple attachments per message, and filename preservation.

  • -

Download free Open PGP software

Category:News Tags : 

GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard. Documents can be encrypted, decrypted, signed and verified from your PC or workstation using this intuitive tool.  An integrated key manager allows you to quickly create, import, export and manage Open PGP keys needed to encrypt and decrypt files.

GoAnywhere OpenPGP Studio will run on almost any operating system including Windows®, Linux, Mac OS X®, Solaris and UNIX. You can download and install it to your desktop within just a few minutes.

Why Use GoAnywhere OpenPGP Studio?

You may be required to store or transmit files that contain sensitive information such as personal data, bank account numbers, financial information or health records. If not properly protected, these files could be vulnerable to attacks by hackers and other unauthorized users. By first encrypting those files with Open PGP, you can add a very high level of security to this data and comply with the latest regulations.

About Open PGP Encryption

Conventional encryption methods uses a single key or password to encrypt and decrypt information. This key or password has to be kept secret, otherwise the data could be compromised by an attacker. The main challenge with this approach is determining how to share the key or password with only the intended recipients in a secure manner.

In contrast, Open PGP encryption is a dual-key (asymmetric) encryption system which uses a combination of a public key and private key. The public key is used to encrypt the file while the corresponding private key is used for decryption. The public key can be shared with your partners using traditional email or FTP since the public key is only used for encryption (it cannot decrypt the data).

Open PGP, also known as GPG, is a popular encryption standard that is supported by popular  commercial PGP solutions. GoAnywhere OpenPGP Studio supports a wide variety of encryption  algorithms including AES (Advanced Encryption Standard) and TDES  ciphers.

For more information and download please visit: http://www.goanywheremft.com/products/openpgp-studio