Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The component has the following attributes which can be configured from its Configuration Property sheet. Figure 1 illustrates the panel with expert properties

Image RemovedImage Added
Figure 1: Configurable properties for Decryption component

...

Decryption Details consists Data Encryption Details and Verification Details.

Data Decryption Details

Image RemovedImage Added  
Figure 2: Decryption Algorithm Details

...

The supported algorithms that are available are DES, PGP, PGP_RFC4880, Base64, TripleDES, AES256, AES128, RC2-40, RC2-64, and RC2-128.

The configuration for each algorithm is mentioned in the sections below.

DES Encryption Algorithm Configuration

The following are the configurations of the individual algorithms:For DES , the configuration panel is as shown in the Figure 2. Set the following fields accordingly.

  • Encryption Key: Specify key which is used to encrypt the incoming data. Specify 32 digit key for AES256, 16 digit key for AES128, 16 digit key for DES, 24 digit key for TripleDES, 5 digit key for RC2_40, 8 digit key for RC2_64 and 16 digit key for RC2_128
  • Allow Padding: Choose yes to allow padding to the key to make exactly the value required for the mentioned algorithm. It has to be chosen only when we know that encrypted data key is also padded.
  • Transformation: <>
AES256, AES192, AES128, TripleDES Encryption Algorithm configurations

Image RemovedImage Added
Figure 3: AES256 , AES192 , AES128,TripleDES Encryption configuration

Set the Encryption key and the Padding key details similar to the DES algorithm.

  • Key Encoded Format: <>
  • Key Conversion Type: <>
    • Base64: <>
    • Hex: <>
  • InitializationVector: Mention the unique 64 bit input used in the encryption.
RC2_40, RC2_64,RC2_128 Encription Algorithm Configurations

Image RemovedImage Added
Figure 4: RC2_40, RC2_64,RC2_128 Algorithm Encryption

...

PGP Encryption Configuration

Image RemovedImage Added
Figure 5: PGP, PGP_RFC4880 Algorithm Encryption

...

RSA Encryption Configuration

Image RemovedImage Added
Figure 6: RSA Algorithm Encryption

...

  1. Text : This requires the Encryption Key details
    • Encryption Key : Specify the appropriate Encryption Key for the selected algorithm to be used to decrypt the incoming data..
  2. PublicKeyFile: The public Key File field has to be filled for this.
    • Public Key File: Provide the file containing the public key.
  3. PrivateKeyFileThe Private Key Password and the Private Key File are the active fields under this.
    • Private Key password: Provide the private key password.
    • Private Key File: Provide the file containing the Private Key .
  4. Certificate: Certificate File is the active field when the key source is Certificate.
    • Certificate File: provide the path of the X509 Certificate.

Digest Decryption Details

Image Removed Image Added  
Figure 7: Digest type for verifying digested data can be provided as given above.

...

Binary Input Required

Click yes if the input is Binary.

Read Input From File?

Choose this option to read input from a file instead of the component input port.

Input File Directory

...

Input File Name

Name of the input Input File.

Write output to File?

Select this option if the output is to be written into a file.

Output File Directory

Directory where the output file needs to be stored.

...

Check this option when the signed message need needs to be verified without decrypting the data.

Expert Properties

Enable the Expert Properties view to configure these properties.

Warning

Expert properties are meant for advanced users; use with caution.

Image Added
Figure 8: Decryption CPS with the Expert properties highlighted

Process Message Based on Property

The property helps components to skip certain messages from processing.

Refer to the Process Message Based On a Property section under the Common Configurations page.

Cleanup resources (excluding connection) after each document

This closes all the resources except for the connection after every request. If the less processing time is more important the less memory usage, then it is recommended to disable this property and vice versa.

For more details, refer to the respective section under in the Common Configurations page.

Target Namespace

Refer to the Target Namespace section under the Common Configurations page.  

Monitoring Configuration

Please refer to the Monitoring Configuration section in Common Configurations page.

Testing

Configure the Decryption component as described in Configuration and Testing section and use feeder and display component to send sample input and check the response respectively.


Figure 89: Sample input


Figure 910: Sample output

Functional Demonstration

...

Configure the Decryption component as described in Configuration and Testing section and use feeder and display component to send sample input and check the response respectively.


Figure 1011: Demonstrating Scenario 1 with sample input and output

...

In a bond trading scenario, request for quotes (RFQ) are sent in encrypted form to the appropriate exchanges and the received encrypted responses are decrypted at the user end


Figure 1112: Bond Trading Scenario

The event process that demonstrates this scenario is bundled with the installer. Note encryption and decryption components may not be present.

...

Adaptavist ThemeBuilder EngineAtlassian Confluence