SlideShare uma empresa Scribd logo
1 de 43
1
Patna Meetup will start shortly...meanwhile
@Attendees: Kindly introduce yourself in Chat
● Name
● Company
● Location
● Mule Experience
Cryptography in Mulesoft
Patna MuleSoft Meetup
3
● Introduction
● Cryptography
● Crypto in Mulesoft
● Demo
● Q&A
● Meetup: Feedback & Upcoming Events
Agenda
5
Meet your Patna Meetup Leaders
6
● Both the speaker and host are organizing this meet up in individual capacity only. We are not representing our companies here.
● This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any responsibility that same solution will
work for your business requirements also.
● This presentation is not meant for any promotional activities.
● This meeting will be recorded and shared.
Safe Harbour Statement
7
Today’s Meetup Speaker
Sai Krishna Sanjapu
ConvergeOne
Cryptography&Mulesoft
What is Cryptography?
Cryptography is the science of writing in secret code so that no other person except
the intended recipient could read
Cryptography is the practice and study of techniques for secure communication in
the presence of third parties. More generally, it is about constructing and analyzing
protocols that overcome the influence of attackers or outside people and which are
related to various aspects in information security such as data confidentiality, data
integrity and authentication.
It is the science of using mathematics to encrypt and decrypt data. Cryptography
enables you to store sensitive information or transmit it across insecure networks
(like the Internet) so that it cannot be read by anyone except the intended recipient.
..
Cryptography
Cryptography Module in Mulesoft
Functionalities in Crypto
PGP
JCE
XML
CheckSum
Jce Encryption
The JCE strategy enables you to use the wider range of cryptography
capabilities provided by the Java Cryptography Extension.
You can use cryptography capabilities in two ways:
Password Based Encryption
Key Based Encryption
Jce Encrypt Pbe/Decrypt Pbe
By using Given Algorithm and Password Jce Encrypt Pbe and Encrypt the data and
gives the binary output and reverse Mechanism applies in Decryption
Jce Encrypt
It as two flavours Symmetric Encryption
Asymmetric Encryption
Symmetric Encryption Uses Secret Key for both Encryption and Decryption Process
Supported KeyStore Formats are:: “JCEKS” “PKCS12” (JKS is not supported)
> It is less secure and decryption time is very less
Asymmetric Encryption uses Public key for Encryption and Private key as Decryption
Supported Formats JKS,JCEKS,PKCS12
> It is More Secure but decryption time is slow compare to symmetric
We can use openssl,keystore Explorer etc.. to generate Jave Cryptography Keys
Symmetric Encryption
Asymmetric Encryption
Keystore Explorer
Note: For Symmetric key size of the key is very small and size
changes based on the algorithm
Jce Configuration
In the Algorithm section Cipher and Algorithm and mutually Exclusive
Connector By Default identifies public and private key based on password if password
presents it is private key and it picks from keystore using store password as above
CheckSum in Crypto
Calculate checksum is use to calculate hash value by using SHA and MD5 Algorithms
Validate checksum is used to validate the hashvalue in target system to check
message Integrity if message is altered it will give Crypto:validation error
Crypto in Dataweave
Dataweave Supports Crypto Module it as various supported SHA and
MD5 Algorithms
We need to import “ import * from dw::Crypto“ in Dw Module
JCE Sign
Digital Signing Uses Internally digest(or)hashing Algorithm to generate
Digest Value
Message signing, on the other hand, uses the sender’s private key to
encrypt the hash value and send the Signature to target system
JCE Signature Validate
In the validation component
We need to pass our actual payload
Which we need to validate to check
Message Integrity and in mule the
Datatype is String
In the Expected tag configuration we
Need to pass Sender Signature
Value
Note: All Mule Crypto Modules
Support Detached Signatures Only
PGP Cryptography
Mule can encrypt all or part of a message using Pretty Good Privacy
(PGP). PGP combines data compression and data encryption to
secure messages. The compression reduces the size of the payload to
help reduce the transmission time later on your application.
○ Encryption: Using another party’s public key to encrypt an
outgoing message in a Mule app.
○ Decryption: Using your own private key to decrypt an incoming
message in a Mule app.
PGP Encryption/Decryption Flow
PGP combines some of the best features of both conventional and public key
cryptography. PGP is a hybrid cryptosystem
PGP then creates a session key, which is a one-time-only secret key. This key is a
random number generated from the random movements of your mouse and the
keystrokes you type. This session key works with a very secure, fast conventional
encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is
encrypted, the session key is then encrypted to the recipient's public key. This public
key-encrypted session key is transmitted along with the ciphertext to the recipient.
Decryption works in the reverse. The recipient's copy of PGP uses his or her private key
to recover the temporary session key, which PGP then uses to decrypt the
conventionally-encrypted ciphertext.
PGP Encryption
PGP Decryption
Creation of PGP Key Pair
We can use Kleopatra or GitBash to generate pgp key pair
Once we give our name emailID and Algorithm,Key size and then select Create it will
generate Public Key Private Key and FingerPrint and PassPhrase for you private Key
Using Git Bash :
Execute below commands to generate pgp key pair
gpg --gen-key
gpg --list-secret-keys --keyid-format LONG
gpg --output F:pgp-keysmule_pub.gpg --export
saikrishna1736@gmail.com
gpg --export-secret-keys 46CCBC676154E2F9AA
1639BA0D14 > F:pgp-keysmule_private.gpg
.asc “ASCII format”
.gpg “Binary Format”
Pgp Encrypt/Decrypt:
We Use Public Key in Encrypt
We Use Private Key in Decrypt
Pgp Encrypt&Sign
This component will do first Signing and
Then will perform Encryption the returned
Message as Signature inside its encrypted
Contents for sigining.it uses Private key for
sign and For encryption it uses Public key
Note: Whenever we send Encrypt&Sign data
For Pgp Decrypt we need to set “Validate if
Signature found = true” in Pgp Decrypt
So that component will able to take Public
Key From Key configuration and Validate the
Signature If validation Success it will give
Decryption Payload
Xml Encryption/Decryption
Xml Encryption uses same Java KeyStore Configuration and uses Public key for
Encryption and Private Key for decryption and we can use Element path is an
XPath expression that identifies the element to encrypt or decrypt we can use
symmetric and asymmetric Mechanism as per our need
XML Sign
Canonicalization Algorithm defines internal canonical algorithm
mappings
Detached Signatures we need to pass Element Path remaining modes
its optional
Attached|Detached Signatures:
Demo Time !
Q&A
Trivia/Quiz
38
● All Questions will be Multiple Choice Questions.
● Respond answers in Chat Window.
● First correct answer for every question will be the winner for that question
● One voucher per month - Across All Meetups
● Note for Trivia Winners:
■ Make sure the host has your full name, email address and linkedIn profile before leaving
■ Voucher sent to winners within 10 days
Trivia Rules
39
We have generated the hash value using the MD5 algorithm. How to decrypt the hash value using
the options listed below
A) Using same MD5 Algorithm
B) It is Not Possible to Decrypt Hash Value
C) Using Jce Decrypt
D) None of the Above
Questions 1:
40
Which of the algorithms is not supported to generate the checksum?
A) CRC32
B) MD2
C) SHA_256
D) RC2
Questions 2:
41
Which of the keystore types could support generating a symmetric key?
A) JCEKS
B) JKS
C) PGP
D) None of the above
Questions 3:
Meetup Feedback
43
● Share:
○ Tweet using the hashtag #MuleSoftMeetups #MuleMeetup
○ Invite your network to join: https://meetups.mulesoft.com/patna
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
● Nominate Yourself as Meetup Speaker:
○ Amazing opportunity to public speaking, broadening skills and expanding network
Knowledge Shared is Knowledge Squared!
Thank You !!!

Mais conteúdo relacionado

Mais procurados

API Strategy Introduction
API Strategy IntroductionAPI Strategy Introduction
API Strategy IntroductionDoug Gregory
 
How to create a 'Master Test Plan'
How to create a 'Master Test Plan'How to create a 'Master Test Plan'
How to create a 'Master Test Plan'PractiTest
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessYolanda Williams
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Карта компетенций методиста онлайн-курсов
Карта компетенций методиста онлайн-курсовКарта компетенций методиста онлайн-курсов
Карта компетенций методиста онлайн-курсовMarina Litvinova
 
What is Shift Left Testing.pdf
What is Shift Left Testing.pdfWhat is Shift Left Testing.pdf
What is Shift Left Testing.pdfTestbytes
 
Securing application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsSecuring application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsBinu Ramakrishnan
 
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security Edition2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security EditionAPIsecure_ Official
 
Quality strategies in Agile Transformation
Quality strategies in Agile TransformationQuality strategies in Agile Transformation
Quality strategies in Agile TransformationKaali Dass PMP, PhD.
 

Mais procurados (12)

API Strategy Introduction
API Strategy IntroductionAPI Strategy Introduction
API Strategy Introduction
 
How to create a 'Master Test Plan'
How to create a 'Master Test Plan'How to create a 'Master Test Plan'
How to create a 'Master Test Plan'
 
Severity and Priority
Severity and PrioritySeverity and Priority
Severity and Priority
 
Exploratory testing workshop
Exploratory testing workshopExploratory testing workshop
Exploratory testing workshop
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Карта компетенций методиста онлайн-курсов
Карта компетенций методиста онлайн-курсовКарта компетенций методиста онлайн-курсов
Карта компетенций методиста онлайн-курсов
 
What is Shift Left Testing.pdf
What is Shift Left Testing.pdfWhat is Shift Left Testing.pdf
What is Shift Left Testing.pdf
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Securing application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environmentsSecuring application deployments in multi-tenant CI/CD environments
Securing application deployments in multi-tenant CI/CD environments
 
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security Edition2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security Edition
 
Quality strategies in Agile Transformation
Quality strategies in Agile TransformationQuality strategies in Agile Transformation
Quality strategies in Agile Transformation
 

Semelhante a CryptoGraphy Module in Mulesoft

Mulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleMulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleManjuKumara GH
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyAhmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyShekh Muenuddeen
 
PGP managing Key Lecture 007
PGP managing Key Lecture 007PGP managing Key Lecture 007
PGP managing Key Lecture 007Qaisar Ayub
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxSanjeev Kumar Jaiswal
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionTanner Lovelace
 
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 Pgsodium's Features: those not provided by pgcrypto and integration with rem... Pgsodium's Features: those not provided by pgcrypto and integration with rem...
Pgsodium's Features: those not provided by pgcrypto and integration with rem...EDB
 
Encrption in mule
Encrption in muleEncrption in mule
Encrption in muleSindhu VL
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security muleSindhu VL
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Cryptography
CryptographyCryptography
CryptographyMilap Oza
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

Semelhante a CryptoGraphy Module in Mulesoft (20)

Mulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleMulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography Module
 
Cryptography 101
Cryptography 101Cryptography 101
Cryptography 101
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyAhmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
 
PGP managing Key Lecture 007
PGP managing Key Lecture 007PGP managing Key Lecture 007
PGP managing Key Lecture 007
 
Unit 4
Unit 4Unit 4
Unit 4
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 Pgsodium's Features: those not provided by pgcrypto and integration with rem... Pgsodium's Features: those not provided by pgcrypto and integration with rem...
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 
Encrption in mule
Encrption in muleEncrption in mule
Encrption in mule
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Asif
AsifAsif
Asif
 
Pgp
PgpPgp
Pgp
 
Cryptography
CryptographyCryptography
Cryptography
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Pgp
PgpPgp
Pgp
 

Mais de shyamraj55

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
ServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxshyamraj55
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31shyamraj55
 
Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26shyamraj55
 
An overview of Anypoint API Community Manager
An overview of Anypoint API  Community ManagerAn overview of Anypoint API  Community Manager
An overview of Anypoint API Community Managershyamraj55
 
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMSimplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMshyamraj55
 
ChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftshyamraj55
 
Exploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex GatewayExploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex Gatewayshyamraj55
 
SNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfSNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfshyamraj55
 
CLI for DataWeave Scripts
CLI for DataWeave ScriptsCLI for DataWeave Scripts
CLI for DataWeave Scriptsshyamraj55
 
MuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsMuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsshyamraj55
 
MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14shyamraj55
 
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfSalesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfshyamraj55
 
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0shyamraj55
 

Mais de shyamraj55 (17)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
ServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
 
Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26
 
An overview of Anypoint API Community Manager
An overview of Anypoint API  Community ManagerAn overview of Anypoint API  Community Manager
An overview of Anypoint API Community Manager
 
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMSimplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
 
ChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoft
 
Exploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex GatewayExploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex Gateway
 
SNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfSNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdf
 
CLI for DataWeave Scripts
CLI for DataWeave ScriptsCLI for DataWeave Scripts
CLI for DataWeave Scripts
 
MuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsMuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocs
 
MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14
 
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfSalesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
 
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
 

Último

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 

Último (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

CryptoGraphy Module in Mulesoft

  • 1. 1 Patna Meetup will start shortly...meanwhile @Attendees: Kindly introduce yourself in Chat ● Name ● Company ● Location ● Mule Experience
  • 3. 3 ● Introduction ● Cryptography ● Crypto in Mulesoft ● Demo ● Q&A ● Meetup: Feedback & Upcoming Events Agenda
  • 4. 5 Meet your Patna Meetup Leaders
  • 5. 6 ● Both the speaker and host are organizing this meet up in individual capacity only. We are not representing our companies here. ● This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any responsibility that same solution will work for your business requirements also. ● This presentation is not meant for any promotional activities. ● This meeting will be recorded and shared. Safe Harbour Statement
  • 6. 7 Today’s Meetup Speaker Sai Krishna Sanjapu ConvergeOne
  • 8. What is Cryptography? Cryptography is the science of writing in secret code so that no other person except the intended recipient could read Cryptography is the practice and study of techniques for secure communication in the presence of third parties. More generally, it is about constructing and analyzing protocols that overcome the influence of attackers or outside people and which are related to various aspects in information security such as data confidentiality, data integrity and authentication. It is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
  • 9. ..
  • 11. Cryptography Module in Mulesoft Functionalities in Crypto PGP JCE XML CheckSum
  • 12. Jce Encryption The JCE strategy enables you to use the wider range of cryptography capabilities provided by the Java Cryptography Extension. You can use cryptography capabilities in two ways: Password Based Encryption Key Based Encryption
  • 13. Jce Encrypt Pbe/Decrypt Pbe By using Given Algorithm and Password Jce Encrypt Pbe and Encrypt the data and gives the binary output and reverse Mechanism applies in Decryption
  • 14. Jce Encrypt It as two flavours Symmetric Encryption Asymmetric Encryption Symmetric Encryption Uses Secret Key for both Encryption and Decryption Process Supported KeyStore Formats are:: “JCEKS” “PKCS12” (JKS is not supported) > It is less secure and decryption time is very less Asymmetric Encryption uses Public key for Encryption and Private key as Decryption Supported Formats JKS,JCEKS,PKCS12 > It is More Secure but decryption time is slow compare to symmetric We can use openssl,keystore Explorer etc.. to generate Jave Cryptography Keys
  • 17. Keystore Explorer Note: For Symmetric key size of the key is very small and size changes based on the algorithm
  • 18. Jce Configuration In the Algorithm section Cipher and Algorithm and mutually Exclusive Connector By Default identifies public and private key based on password if password presents it is private key and it picks from keystore using store password as above
  • 19. CheckSum in Crypto Calculate checksum is use to calculate hash value by using SHA and MD5 Algorithms Validate checksum is used to validate the hashvalue in target system to check message Integrity if message is altered it will give Crypto:validation error
  • 20. Crypto in Dataweave Dataweave Supports Crypto Module it as various supported SHA and MD5 Algorithms We need to import “ import * from dw::Crypto“ in Dw Module
  • 21. JCE Sign Digital Signing Uses Internally digest(or)hashing Algorithm to generate Digest Value Message signing, on the other hand, uses the sender’s private key to encrypt the hash value and send the Signature to target system
  • 22. JCE Signature Validate In the validation component We need to pass our actual payload Which we need to validate to check Message Integrity and in mule the Datatype is String In the Expected tag configuration we Need to pass Sender Signature Value Note: All Mule Crypto Modules Support Detached Signatures Only
  • 23. PGP Cryptography Mule can encrypt all or part of a message using Pretty Good Privacy (PGP). PGP combines data compression and data encryption to secure messages. The compression reduces the size of the payload to help reduce the transmission time later on your application. ○ Encryption: Using another party’s public key to encrypt an outgoing message in a Mule app. ○ Decryption: Using your own private key to decrypt an incoming message in a Mule app.
  • 24. PGP Encryption/Decryption Flow PGP combines some of the best features of both conventional and public key cryptography. PGP is a hybrid cryptosystem PGP then creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type. This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient. Decryption works in the reverse. The recipient's copy of PGP uses his or her private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted ciphertext.
  • 27. Creation of PGP Key Pair We can use Kleopatra or GitBash to generate pgp key pair Once we give our name emailID and Algorithm,Key size and then select Create it will generate Public Key Private Key and FingerPrint and PassPhrase for you private Key
  • 28. Using Git Bash : Execute below commands to generate pgp key pair gpg --gen-key gpg --list-secret-keys --keyid-format LONG gpg --output F:pgp-keysmule_pub.gpg --export saikrishna1736@gmail.com gpg --export-secret-keys 46CCBC676154E2F9AA 1639BA0D14 > F:pgp-keysmule_private.gpg .asc “ASCII format” .gpg “Binary Format”
  • 29. Pgp Encrypt/Decrypt: We Use Public Key in Encrypt We Use Private Key in Decrypt
  • 30. Pgp Encrypt&Sign This component will do first Signing and Then will perform Encryption the returned Message as Signature inside its encrypted Contents for sigining.it uses Private key for sign and For encryption it uses Public key Note: Whenever we send Encrypt&Sign data For Pgp Decrypt we need to set “Validate if Signature found = true” in Pgp Decrypt So that component will able to take Public Key From Key configuration and Validate the Signature If validation Success it will give Decryption Payload
  • 31. Xml Encryption/Decryption Xml Encryption uses same Java KeyStore Configuration and uses Public key for Encryption and Private Key for decryption and we can use Element path is an XPath expression that identifies the element to encrypt or decrypt we can use symmetric and asymmetric Mechanism as per our need
  • 32. XML Sign Canonicalization Algorithm defines internal canonical algorithm mappings Detached Signatures we need to pass Element Path remaining modes its optional
  • 35. Q&A
  • 37. 38 ● All Questions will be Multiple Choice Questions. ● Respond answers in Chat Window. ● First correct answer for every question will be the winner for that question ● One voucher per month - Across All Meetups ● Note for Trivia Winners: ■ Make sure the host has your full name, email address and linkedIn profile before leaving ■ Voucher sent to winners within 10 days Trivia Rules
  • 38. 39 We have generated the hash value using the MD5 algorithm. How to decrypt the hash value using the options listed below A) Using same MD5 Algorithm B) It is Not Possible to Decrypt Hash Value C) Using Jce Decrypt D) None of the Above Questions 1:
  • 39. 40 Which of the algorithms is not supported to generate the checksum? A) CRC32 B) MD2 C) SHA_256 D) RC2 Questions 2:
  • 40. 41 Which of the keystore types could support generating a symmetric key? A) JCEKS B) JKS C) PGP D) None of the above Questions 3:
  • 42. 43 ● Share: ○ Tweet using the hashtag #MuleSoftMeetups #MuleMeetup ○ Invite your network to join: https://meetups.mulesoft.com/patna ● Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program ● Nominate Yourself as Meetup Speaker: ○ Amazing opportunity to public speaking, broadening skills and expanding network Knowledge Shared is Knowledge Squared!