Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
ssl web

ssl web

Ratings: (0)|Views: 817|Likes:
Published by karthickmsit
ssl web

http://middlewarenews.blogspot.com/


ssl web

http://middlewarenews.blogspot.com/


More info:

Published by: karthickmsit on Aug 27, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/25/2014

pdf

text

original

 
IBM Software Group
© 2003 IBM Corporation
IBM Confidential
 
© 2003 IBM Corporation
WebSphere MQ Channel Security with SSL
Morag Hughsonhughson@uk.ibm.com
© 2003 IBM Corporation
IBM Software Group | WebSphere software
Channel Security - Agenda
Security ProblemsSecure Sockets Layer (SSL)WebSphere MQ and SSL
Planning TasksWebSphere MQ Configuration TasksSecurity Administration Tasks
1-2
 
© 2003 IBM Corporation
IBM Software Group | WebSphere software
Security Problems
Eavesdropping
How do I stop someone from seeing the information I send?
Tampering
How can I detect if someone has intercepted my information and changedit?
Impersonation
How can I be sure who the information is from?How can I be sure who I am exchanging information with?
© 2003 IBM Corporation
IBM Software Group | WebSphere software
NOTES
Security Problems : Notes
We are going to look at three main security problems in turn, eavesdropping, tampering andimpersonation.To deal with the problem of eavesdropping, you need to encrypt your information before you send itso that an eavesdropper cannot read your information. We will look at the different ways you canencrypt your message and what the problems are associated with them.To deal with the problem of tampering, you can use a one-way hash function.To deal with the problem of impersonation, you need to be able to verify the sender of theinformation and also to be able to authenticate the partner you are exchanging information with.Only the owner of the public key can decrypt information encrypted using it. However, how do youreally know who the owner of the public key is?
3-4
 
© 2003 IBM Corporation
IBM Software Group | WebSphere software
Cryptography
decryptionencryptionplaintextplaintext
Symmetric KeySecret Key

ciphertext
5-6

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->