cancel
Showing results for 
Search instead for 
Did you mean: 

Source-> PI ->Target using Decryption and encryption

manikandan_shanmugam3
Active Participant
0 Kudos

Dear All,

Scenario:  Source (Encrypted Message using Public Key (Proxy))-> PI( Decryption using Private key then extract the message and encrypt again using Public key) -> Target

We are deploying the certificates in the VA for private and public key and in run time we have to look up Keystore for keys and decrypt the encrypted incoming message and perform the logic to extract the data and again need to encrypt the data.

Kindly let me know the idea and sample code for the reference

PI version: 7.0

Regards,

Manikandan

Accepted Solutions (0)

Answers (2)

Answers (2)

iaki_vila
Active Contributor
0 Kudos

Hi Manikandan,

Check this blog, may be could be useful for you:

http://scn.sap.com/people/sandeep.maurya4/blog/2011/01/23/pgp-encryptiondecryption-using-java-code

Regards.

baskar_gopalakrishnan2
Active Contributor
0 Kudos

You can handle this using java mapping.  Sender system needs to encrypt the data and during mapping you can decrypt as the first step in the operation mapping. The below might help you for understanding encryption and decryption using standard algorithm. Search online for similar code examples. You might want to search also oracle site for this

http://www.exampledepot.com/egs/javax.crypto/desstring.html