Menu

SimpleAutack

AUTACK Signature

A wide range of algorithms, mechanisms or mode can be utilized in the ISO 9735 standard. Every domain implements a subset of the standard (D6/CRG in Financial field, ISABEL in Belgium, ZKA in Germany ..); causing sometimes trouble for softwarehouses to support all these subsets.

Instead of using the attached security technics in ISO9735-5 with EDIFACT certificates, a lot of domains prefered the use of the AUTACK message with named keys . The AUTACK message is no more used as detached signature but as an attached signature in the same interchange or file.

SimpleAutack provides the AUTACK signature in a simple method by using the EDI5X multi-devices library which will enable the use of ETEBAC5 or X509 devices for AUTACK signing.

SimpleAutack Specifications

SimpleAutack provides attached signature technics by AUTACK message.

SimpleAutack is the lite version of EDI*SEC and offers the Autack versions for D6, ZKA, ISABEL, 4.2, 4.1, the AECOC security and supports the EDI5X multi-devices library.

Functions are called via C API, scripts or applets for the web.

Operating Systems :

  • Windows,
  • Linux,
  • Contact us for other OS.

Specifications:

  • C API , Java, Applets and scripts.
  • Signatures D6, 4.2, 4.1, ZKA et ISABEL.
  • High level Signature requests on files and data by EDI5X devices (Etebac5, EDI5, PKCS11, CryptoAPI and OpenSSL).
  • Hashing SHA1, SHA2, SHA512 and MD5.
  • RSA Signature in modes 9796, 9796-2, 9796-2 schema 2, PKCS1 and X509.
  • Trail Management .
  • Self-Signed X509 and EDI5 devices generation.
  • Export and Import of public keys by Keyman Message and Paper format.

Edifact Security

EDI*SEC: Edifact & ISO9735 Security

 

The Edifact version (syntax 4) brings new modifications to the version three. Among these modifications the normalization of the security services which were not a part of the syntax 3 standard which were described in MIGs or by adapting some messages(CIPHER, CONFID ...)

The parts 5,6,7 and 9 of the standard implement the security services and define respectively the security by joined segments, the security by the AUTACK message, confidentiality and key and certificates management.

The certificates are Edifact certificates. But other formats can be utilized such as X509 or named keys.

A wide range of algorithms, mechanisms or mode can be utilized in the standard. Every domain implements a subset of the standard (D6/CRG in Financial field, ISABEL in Belgium, ZKA in Germany ..); causing sometimes trouble for softwarehouses to support all these subsets.

As almost all Edifact convertirs utilize the syntax 3, the security can be utilized in its syntax 4 format. Both syntaxes 3 and 4 of the security can be utilized with the syntax 3 of Edifact, as well as the syntax 4 of security with the syntax 4 of Edifact.

In financial EDI the Edifact security is used in International Payorders, Diredbs,....

EDI*SEC Specifications

EDI*SEC offers the attached security syntax based on the EDIFACT/ISO9735-5 , the detached signature and acknowledgment generation based on ISO9735-6.

Confidentiality with CIPHER and CONFID are supported by the EDI*CIPHER product.

The lite version SimpleAutack offers the Autack versions for D6, ZKA, ISABEL, 4.2, 4.1, the AECOC security and supports the EDI5X multi-devices library.

All functions are available for clients and servers.

Functions are called via C API or scripts.

Functions :

  • Embedded and separated security on Edifact files or other types.
  • Communication layers independency.
  • Securized files can be transmitted by any mean (email, ftp,...)
  • Security on interchange, all or some messages level.
  • Non Edifact files can be securized by package or by Autack.
  • Modularity and scalarability.

Operating Systems :

  • Windows,
  • Linux,
  • Contact us for other OS.

Specifications:

  • Contexts management,
  • security devices management,
  • certificates management,
  • Support of Edifact certificates, named keys & X509 Certificates,
  • keys and random numbers management,
  • KEYMAN message support,
  • RSA signature,
  • Hash Functions: SHA1, SHA2, SHA512, DES-CBC, DES-MDC, MD5, MD4, MD2, RIPEMD128 & RIPEMD160.
  • Encryption Functions: DES-CBC, Triple DES, RCx 128 bits & IDEA ,
  • Proofs management,
  • Trail management by TRAILMAN.