How safe is to exchange encrypted sensitive data over unsecured network

Hi All:
We have developed a signed applet to display sensitive data. The applet communicates with Server over SSL connection. Applet is developed with SUN JDK 1.4.2_06 and uses JSSE to communicate with the Server, which is using openSSL. After we deployed the applet to end customers, we found that there exists a SocketTimeOut issue with JSSE bundled with SUN 14.2_06 JRE. We reported it to SUN and they told us that it is going to be fixed in a new release 1.4.2_11 that is going to come out by this month end.
In the mean time we are exploring different options. Just wondering whether it is safe to use thirdy party libraries such as one from BouncyCastle, RSA (RSA-BSAFE C/J),etc. to encrypt the sensitive data and exchange the same over unsecured communication channels? We are for sure want to use asymmetric keys for encryption. We are not experts in security related matters. We would like to get some valuable inputs from you.
Thanks a lot in advance....

If you use public/private keys you are as safe as your private keys are. You will find this is rather slow. SSL uses the public/private keys to negotiate a one-time session key which is used symmetrically which is much quicker.

Similar Messages

  • HT1695 How can I connect my MacBook to Internet over cellular network

    How can I connect my MacBook to Internet over cellular network?

    Read here:
    http://support.apple.com/kb/ht4517

  • Safe to transmit sensitive data over 3G?

    The title pretty much sums up my question. Is is safe to transmit sensitive data, such as entering passwords to websites, while over the 3G network?
    I've read the articles about the 3G encryption being cracked but that was back in January and I haven't been able to find any updates.
    For now I'm playing it safe and I never enter any passwords, not even my iTunes password, unless I'm at home on my own Wi-Fi network, but that completely defeats the purpose of having a smartphone in the first place.

    Red Rooster wrote:
    Yes thank you, I do realize that. What I mean to ask is the security of the data being transmitted before it gets to the website. How secure is my data as it travels from my phone, across the 3G network, before it gets to the website? Can someone out there intercept it as it travels across AT&T's network?
    Yes, it's safe providing the site is encrypted. That's the point of encryption.

  • HT204014 How can I get spotlight search to work over a network running OS X Server?

    I have installed OS X Server on an iMac to share its files over a network.
    I can access the files fine, but if I try and search the shared folders from another Mac on the network it yields no results.
    How can I get search to work as well as it does on the files on local disks.

    Spotlight searching of shared volumes works for me using OS X 10.10.3 Server and OS X 10.10.3 client, as follows:
    If I use Spotlight to search for some content "Aaron Aardvark" the file that contains this text does not seem to show up in the immediate results, but if I select "Show All in Finder" and switch from "This Mac" to "Shared" the file "untitled text.txt" that contains it is listed.
    In the past Spotlight was responsible for bringing servers to their knees, so I suspect that the above two-step process is a way of limiting server searches to cases where it is actually required.
    Server 4.1 (OS X 10.10.3) seems to add the extended attributes needed to allow Spotlight to index sharepoints:
         test_server3:~ admin$ ls -el /Volumes/Server\ 3\ Users/
         total 0
         drwxr-xr-x+ 4 admin  staff  136 30 Apr 17:02 Server 3 Users
          0: user:_spotlight inherited allow list,search,file_inherit,directory_inherit
         test_server3:~ admin$
    but in the past, e.g. Snow Leopard server, you could choose whether or not these attributes were set or not. IIRC  Snow Leopard clients would always include server volumes in Spotlight searches, causing significant slow-downs on the client, so a lot of sysadmins, myself included, chose not to enable it.
    C.

  • How can I convert the encrypted SQL data to clear text in CCM?

    I want to retrieve CCM information from SQL database but many of them display as encrypted as follows,
    {14AE763F-D1EE-44A2-93C1-00FB95578E43} {7FD1AACD-6E85-4B79-A0D1-5F25074414D0}
    Any way to convert to clear text?
    Thanks in advance,

    I need to summarize the current CCM configuration into spreadsheet and want to reduce the labor work by manually typing. For example, the Route List display in SQL as I mentioned instead of clear text.
    Any tool available to get all the configuration information as clear text?
    Thanks,

  • Encrypted data transmission over the network

    Dear,
    We used to install oracle with default settings. For security , we use TDE, but in tde the data is not encrypted while transmitted over the network. My question, here are lots of experience DBA , is the network level encryption are used whenever you guy work with PROD system?? Or just ensure only password level encryption??
    Secondly, whenever we encrypt the network flow over the network ,is there any  performance overhead??
    Lastly, How can we configure the  network level encryption??

    I have not needed it, no, but that has nothing to do with whether *you* need it.
    I did not say there would be a performance issue. I said there would be some level of performance overhead. If (as an example), the overhead was very very very small, it's not an issue. I always get a kick out of people asking "I really need this feature (security, encryption, auditing, whatever). Will it cause performance issues?" If you NEED the feature, then you NEED it - the performance overhead is part of playing the game - it's no longer overhead. It's like asking, I need an Oracle database, will it cause my computer to run slower?

  • Need to store sensitive data in a table, need to encrypt or data masking

    Hello,
    I have a table that contains a column of sensitive data. Which is a good method to encrypt this column? How about data masking the column? Other methods? Thank you in advance.

    Will need to share with us who is supposed to see and not supposed to see the data and under what circumstances.
    There are a number of ways to restrict access: via view/roles/privileges, encryption (DBMS_CRYPTO), or TDE if you want to buy the Advanced Security extra-cost option for Enterprise Edition.

  • How to encrypt the data in a form?

    Hi, everyone!
    I want to encrypted the data in a html form
    sent to a JSP/Servlet (using POST method).
    For example, password.
    How to do it? Are there some sample codes or
    guides?
    Cheers,
    George

    About the only way you could accomplish this completely on the client side is with JavaScript. But, that wouldn't be very secure as your encryption code would be publicly visible. If you want the data encrypted before it's sent to the server, you need to use SSL and the HTTPS protocol.

  • How to handle sensitive data in BI?

    Hi there,
    we are about to load data from HR into BI. The authorities according to the queries and InfoProviders are lowered to a minimum so that only a group of people has access to those sensitive data.
    But what about the generated tables in which the data of the InfoProviders are stored? Some people are granted to use SE16 (e.g. the basis team). How is it possible to protect the data from being reviewed without changing the authorities of the basis team.
    Thanks in advance
    Dennis

    Hi Dennis,
    Q.How is it possible to protect the data from being reviewed without changing the authorities of the basis team.
    If you do not want to change the authorities provided to the basis team then you will have to opt for the data in the table to be scrambled so that on displaying the information is not meaningful.
    Not aware, if there could be other options.
    Thanks,
    Saby..

  • How can I encrypt my data links between switch uplink ports ? I'm unable to use "cts Manual" command in C3560X switch.suggest me

    How can I encrypt my data uplinks between switch trunk ports ? I'm unable to use "cts Manual" command in C3560X switch.suggest me as I want to encrypt my switch-to-switch link with Cisco TrustSec.

    Hi 
    Login to switch & go to interface..
    There you can give tags.. (ISL & DONT1Q)
    Command switch-port mode trunk
    Switch-port trunk encapsulation ssl or dot1Q

  • How can I exchange my whole data between my mac book pro and my iMac?

    How can I exchange my whole data between my mac book pro and my iMac?

    i use both, the macbook at work and the imac at home, but ineed to have the same data on both macs, how can i sync them?

  • How to make the exchange of data between 2 while loop in real time

    hello
    I have 2 while loop
    the 1st while loop includes the data acquisition program
    the 2nd while loop includes the control program
    my question is how to make the exchange of data between 2 while loop in real time
    I tried with the local variable and direct wiring between the 2 while loop
    it does not work (there is a delay)
    Solved!
    Go to Solution.

    Bilalus,
    Queues are only good to transfer data if your application isn't deterministic. Since you are using Real Time, I am assuming that your application requires determinism. If you are using Timed Loops and you use queues to transfer data between your loops, you are losing determinism. In this case, you need to use the RT FIFO functions. 
    Warm Regards,
    William Fernandez
    Applications Engineering
    National Instruments

  • How do I encrypt a data file so that only I can retrieve the info?

    How do I encrypt a data file so that it cannot be read without the proper authority?  
    I have an application where the customer should not have access to the data I need to record for troubleshooting purposes.  (there are industrial secrets I wish to protect)  My plan is to record a datalog (currently I am producing a tab-delimited spreadsheet format) whenever the device is running and hide the files where they will probably not be found.  But some sort of encryption or at least password protection would be better.  
    I've never tried to do this before, but thought it would be fairly easy.  Maybe I'm just not looking in the right places.  
    Thanks
    Solved!
    Go to Solution.

    Well, you could look into something like DES, Triple DES, AES, etc.  There are libries floating around for these written in LabVIEW.  I'm not sure about the cost though.
    If you want a really simple way to protect your data, just invert all or some of the bits in each byte of your file.  It is super simple and turns a nice ASCII text file into noise when read from a text file.
    There are only two ways to tell somebody thanks: Kudos and Marked Solutions
    Unofficial Forum Rules and Guidelines

  • How to design universe to dynamically/conditionally hide sensitive data

    Hi,
    I am completely new to the BusinessObjects suite and am trying to understand which features might help me solve a problem.
    In K-12 education, there is often a desire to allow users to drill into and filter data in various ways, but at the same time a need to protect student confidentiality (as required by FERPA, a U.S. law).  It is not sufficient to prevent access to the most detailed data; we also have to prevent the viewer from inferring sensitive data based on obvious demographic characteristics or already-known data.   For instance, given the following dataset for a school:
    Name          Gender          Ethnicity      Score
    Bobby          M                 White          B
    Samuel         M                Black          A
    Richard          M                Black         A
    Jenny          F               White               A
    Margo          F               Black               A
    Whitney        F               White               A
    And a data display like this:
                             Ethnicity
    Gender               <count of As>
    If I filter Gender to F and allow all ethnicity values, I will see the following:
                             Ethnicity: All
    Gender:F               3
    Assuming I the viewer know there are three females in the dataset, and I happen to know that Jenny attends that school (info which is readily available), I now know that Jenny got an A. 
    Can I customize the universe or some other component in the system so that, in the above scenario, I see a "data not available" or something instead of the 3?
    thanks!
    Martin

    Hi,
    You have to PERFORM 3 Steps.
    Step-1
    Create a Universe connection to the (Required)Database.
    Step-2
    Design a UNIVERSE representing your Business flow (Like a Department- HR, Sales, Purchase Etc)- As the UNIVERSE is a semantic layer(Do not hold data) you have to have a exact business flow in terms of how the data is moved and CREATE your required MEASURES and DIMENSIONS.
    Step-3
    Now you use the create the query by USING the MEASURES and DIMENSIONS you created in Step#2drop. Now you can model the report in any way Say... A Graph / Tabular way....
    Hope this is helpful...

  • How does ECC 6.0 support Dynamic Data Exchange?

    Hello Friends,
      I am looking for material on how ECC 6.0 system supports Dynamic Data Exchange. Any leads would be great benefit to me.
    Thanks for Help.
    With Regards
    Vasu

    Hello friends,
    Any lead on this would be great help to me. Thanks for the Help.
    I know that SAP does support Dynamic Data Exchange. I have read in a book. But looking for how SAP supports DDE.
    Thanks for Help.
    With Regards

Maybe you are looking for