SafeScrypt - the confidence to do more Safe Exim
HomeProductResourcesHelpDGFTAbout UsContact UsPartners
 Getting Started 
 Safe EXIM Certificate
Enroll for a Certificate
Documents Required
Enrollment Guide
 SafeDoXX for Safe EXIM
Product Features
User manual
Installation Guide
Download SafeDoXX for Safe EXIM
License Registration
 USB Token
Why use a USB Token?
Installation guide
About Safe EXIM
Benefits of Safe EXIM
Who can Use Safe EXIM?
Product Price
Buy Safe EXIM
Min System Requirements
What is a digital Signature?
What can a digital signature be used for?
PKI Basics

Why passwords are insecure?

Indian IT Act 2000
More resources.....


SafeDoXX for Safe EXIM Glossary of Terms

1. Asymmetric Encryption:
In asymmetric encryption, public key associated with the certificate is used to encrypt data and corresponding private key is used to decrypt data.

2. Automater:
You can automate operations like signing, encrypting, decrypting, verifying and CRL download here

3. Bulk Mailing:
You can sign/encrypt multiple documents and send each signed encrypted document to a recipient.

4. Certificate Store:
It is the repository to store certificates.

5. Certification Authority:
certificate authority is a trusted third party that issues digital certificates and guarantees that the public key really belongs to a specific person or entity.

6. Configuration Manager:
Configuration Manager helps you configure some basic parameters with respect to Signing,Encryption,CRL Logs,SMTP and LDAP.

7. CRL:
A periodically issued list, digitally signed by a CA, of identified certificates that have been suspended or revoked prior to their expiration dates. The list generally indicates the CRL issuer's name, the date of issue, the date of the next scheduled CRL issue, the suspended or revoked certificates' serial numbers, and the specific times and reasons for suspension and revocation.

8. Decryption
-Decryption refers to the process of getting the original file back, which was encrypted.

9. Digital Certificate:
Digital Certificate's are the electronic counterparts to driver licenses, passports, and membership cards. You can present a Digital ID electronically to prove your identity or your right to access information or services online.

10. Digital Signature:
The digital signature is a non-forgeable piece of data that asserts that a named person wrote or otherwise agreed to the document to which the signature is attached.

11. Encryption Algorithm:
It refers to the algorithm used to encrypt data.

12. Encryption:
Encryption refers to transformation of data with a secret code in such a manner that only the intended user can get back the data in its original form.

14. Non-Self Extractor:
The type of output file created when u sign and / encrypt a file which requires the end user to have a reader

16. PKCS:
The Public-Key Cryptography Standards are specifications produced by RSA Laboratories in cooperation with secure systems developers worldwide for the purpose of accelerating the deployment of public-key cryptography

17. Private Key Password:
A mathematical key (kept secret by the holder) used to create digital signatures and, depending upon the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key.

18. Private Key:
A mathematical key (kept secret by the holder) used to create digital signatures and, depending upon the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key

19. Public key cryptography:
A type of cryptography that uses a key pair of mathematically related cryptographic keys. The public key can be made available to anyone who wishes to use it and can encrypt information or verify a digital signature; the private key is kept secret by its holder and can decrypt information or generate a digital signature.

20. Public Key Infrastructure:
The architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system

21. Public Key:
A mathematical key that can be made publicly available and which is used to verify signatures created with its corresponding private key. Depending on the algorithm, public keys are also used to encrypt messages or files, which can then be decrypted with the corresponding private key.

22. Self-Extractor (.exe):
The type of output file created at the time of signing and/encrypting, which doesn't require end user to have a reader

23. Sign:
Sign is an operation to perform Digital Signature on the selected document/s  and which has equivalent legal status as a hand written signature

24. Secure Hash Algorithm:
An algorithm that maps or translates one set of bits into another (generally smaller) set in such a way that, it is computationally infeasible to find two different messages that produce the same hash result using the same algorithm.

25. Serial number:
A value that unambiguously identifies a certificate generated by a CA.

26. Smart card:
A hardware token that incorporates one or more integrated circuit (IC) chips to implement cryptographic functions and that possesses some inherent resistance to tampering.

27. S/MIME:
A specification of E-mail Security exploiting cryptographic message syntax in an Internet Mime environment.

28. SMTP Settings:
SafeDoXX for Safe EXIM allows you to set your SMTP settings.

29. .ssig:
This is the extension of the signed file

30. Symmetric Encryption:
In symmetric encryption the same keys are use to encrypt and decrypt data.

31. Time Stamping:
A notation that indicates (at least) the correct date and time of an action, and identity of the person or device that sent or received the time stamp.

32. Verification Status:
This displays the status of verification

33. Verify:
It refers to authenticating or validating the signer's identity.

2002 All rights reserved. SafeScrypt Ltd