Public Key Infrastructure

Public Key Infrastructure: Basic Definitions

Trading partners of SARS that make use of X.400 communications are not affected by the SARS PKI system as X.400 is considered to already be safe and secure. Find the PKI terminology below.

Some of the terminology related to PKI (Public Key Infrastructure) systems is explained here for the sake of clarity and convenience.

  • SMTP: The “Simple Mail Transfer Protocol” is a protocol for sending e-mail messages between servers over the Internet.
  • HTTP: The “HyperText Transfer Protocol” is a client-server protocol used by computers on the Internet (World Wide Web). It provides a set of instructions for accurate information exchange in the form of request-and-response transactions.
  • HTTPS: The “HyperText Transfer Protocol over Secure Socket Layer” (or “HTTP over SSL”) is a World Wide Web protocol that encrypts and decrypts client requests as well as the responses that are returned by the server.
  • FTP: The “File Transfer Protocol” is a standard network protocol used to exchange files over a TCP/IP based network, such as the Internet.
  • AS1: AS1 stands for “Applicability Statement 1”, and refers to how applicable the Internet is for sending UN/EDIFACT messages in a safe and secure manner, using SMTP e-mail messages.
  • AS2: AS2 stands for “Applicability Statement 2”, and refers to how applicable the Internet is for transmitting UN/EDIFACT information in a safe and secure manner, using the HTTP Internet protocol.
  • AS3: AS3 stands for “Applicability Statement 3”, and refers to how applicable the Internet is for transmitting UN/EDIFACT information in a safe and secure manner, using the FTP protocol.
  • Symmetrical Encryption In a symmetrical data encryption scheme, the same key is used in both the encryption and decryption stages.
  • Secret Key In a symmetrical data encryption scheme, the same key is used in both the encryption and decryption stages. This key is known as the secret key.
  • Asymmetrical Encryption In an asymmetrical data encryption scheme, key pairs are used. If data was encrypted with one key of a key pair, that data can only be decrypted with the other key of that same key pair.

To learn more about EDI and become a certified EDI Professional, please visit our course schedule page.

Leave a Reply

Your email address will not be published.

Post Navigation