SlideShare a Scribd company logo
1 of 43
1
Patna Meetup will start shortly...meanwhile
@Attendees: Kindly introduce yourself in Chat
● Name
● Company
● Location
● Mule Experience
Cryptography in Mulesoft
Patna MuleSoft Meetup
3
● Introduction
● Cryptography
● Crypto in Mulesoft
● Demo
● Q&A
● Meetup: Feedback & Upcoming Events
Agenda
5
Meet your Patna Meetup Leaders
6
● Both the speaker and host are organizing this meet up in individual capacity only. We are not representing our companies here.
● This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any responsibility that same solution will
work for your business requirements also.
● This presentation is not meant for any promotional activities.
● This meeting will be recorded and shared.
Safe Harbour Statement
7
Today’s Meetup Speaker
Sai Krishna Sanjapu
ConvergeOne
Cryptography&Mulesoft
What is Cryptography?
Cryptography is the science of writing in secret code so that no other person except
the intended recipient could read
Cryptography is the practice and study of techniques for secure communication in
the presence of third parties. More generally, it is about constructing and analyzing
protocols that overcome the influence of attackers or outside people and which are
related to various aspects in information security such as data confidentiality, data
integrity and authentication.
It is the science of using mathematics to encrypt and decrypt data. Cryptography
enables you to store sensitive information or transmit it across insecure networks
(like the Internet) so that it cannot be read by anyone except the intended recipient.
..
Cryptography
Cryptography Module in Mulesoft
Functionalities in Crypto
PGP
JCE
XML
CheckSum
Jce Encryption
The JCE strategy enables you to use the wider range of cryptography
capabilities provided by the Java Cryptography Extension.
You can use cryptography capabilities in two ways:
Password Based Encryption
Key Based Encryption
Jce Encrypt Pbe/Decrypt Pbe
By using Given Algorithm and Password Jce Encrypt Pbe and Encrypt the data and
gives the binary output and reverse Mechanism applies in Decryption
Jce Encrypt
It as two flavours Symmetric Encryption
Asymmetric Encryption
Symmetric Encryption Uses Secret Key for both Encryption and Decryption Process
Supported KeyStore Formats are:: “JCEKS” “PKCS12” (JKS is not supported)
> It is less secure and decryption time is very less
Asymmetric Encryption uses Public key for Encryption and Private key as Decryption
Supported Formats JKS,JCEKS,PKCS12
> It is More Secure but decryption time is slow compare to symmetric
We can use openssl,keystore Explorer etc.. to generate Jave Cryptography Keys
Symmetric Encryption
Asymmetric Encryption
Keystore Explorer
Note: For Symmetric key size of the key is very small and size
changes based on the algorithm
Jce Configuration
In the Algorithm section Cipher and Algorithm and mutually Exclusive
Connector By Default identifies public and private key based on password if password
presents it is private key and it picks from keystore using store password as above
CheckSum in Crypto
Calculate checksum is use to calculate hash value by using SHA and MD5 Algorithms
Validate checksum is used to validate the hashvalue in target system to check
message Integrity if message is altered it will give Crypto:validation error
Crypto in Dataweave
Dataweave Supports Crypto Module it as various supported SHA and
MD5 Algorithms
We need to import “ import * from dw::Crypto“ in Dw Module
JCE Sign
Digital Signing Uses Internally digest(or)hashing Algorithm to generate
Digest Value
Message signing, on the other hand, uses the sender’s private key to
encrypt the hash value and send the Signature to target system
JCE Signature Validate
In the validation component
We need to pass our actual payload
Which we need to validate to check
Message Integrity and in mule the
Datatype is String
In the Expected tag configuration we
Need to pass Sender Signature
Value
Note: All Mule Crypto Modules
Support Detached Signatures Only
PGP Cryptography
Mule can encrypt all or part of a message using Pretty Good Privacy
(PGP). PGP combines data compression and data encryption to
secure messages. The compression reduces the size of the payload to
help reduce the transmission time later on your application.
○ Encryption: Using another party’s public key to encrypt an
outgoing message in a Mule app.
○ Decryption: Using your own private key to decrypt an incoming
message in a Mule app.
PGP Encryption/Decryption Flow
PGP combines some of the best features of both conventional and public key
cryptography. PGP is a hybrid cryptosystem
PGP then creates a session key, which is a one-time-only secret key. This key is a
random number generated from the random movements of your mouse and the
keystrokes you type. This session key works with a very secure, fast conventional
encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is
encrypted, the session key is then encrypted to the recipient's public key. This public
key-encrypted session key is transmitted along with the ciphertext to the recipient.
Decryption works in the reverse. The recipient's copy of PGP uses his or her private key
to recover the temporary session key, which PGP then uses to decrypt the
conventionally-encrypted ciphertext.
PGP Encryption
PGP Decryption
Creation of PGP Key Pair
We can use Kleopatra or GitBash to generate pgp key pair
Once we give our name emailID and Algorithm,Key size and then select Create it will
generate Public Key Private Key and FingerPrint and PassPhrase for you private Key
Using Git Bash :
Execute below commands to generate pgp key pair
gpg --gen-key
gpg --list-secret-keys --keyid-format LONG
gpg --output F:pgp-keysmule_pub.gpg --export
saikrishna1736@gmail.com
gpg --export-secret-keys 46CCBC676154E2F9AA
1639BA0D14 > F:pgp-keysmule_private.gpg
.asc “ASCII format”
.gpg “Binary Format”
Pgp Encrypt/Decrypt:
We Use Public Key in Encrypt
We Use Private Key in Decrypt
Pgp Encrypt&Sign
This component will do first Signing and
Then will perform Encryption the returned
Message as Signature inside its encrypted
Contents for sigining.it uses Private key for
sign and For encryption it uses Public key
Note: Whenever we send Encrypt&Sign data
For Pgp Decrypt we need to set “Validate if
Signature found = true” in Pgp Decrypt
So that component will able to take Public
Key From Key configuration and Validate the
Signature If validation Success it will give
Decryption Payload
Xml Encryption/Decryption
Xml Encryption uses same Java KeyStore Configuration and uses Public key for
Encryption and Private Key for decryption and we can use Element path is an
XPath expression that identifies the element to encrypt or decrypt we can use
symmetric and asymmetric Mechanism as per our need
XML Sign
Canonicalization Algorithm defines internal canonical algorithm
mappings
Detached Signatures we need to pass Element Path remaining modes
its optional
Attached|Detached Signatures:
Demo Time !
Q&A
Trivia/Quiz
38
● All Questions will be Multiple Choice Questions.
● Respond answers in Chat Window.
● First correct answer for every question will be the winner for that question
● One voucher per month - Across All Meetups
● Note for Trivia Winners:
■ Make sure the host has your full name, email address and linkedIn profile before leaving
■ Voucher sent to winners within 10 days
Trivia Rules
39
We have generated the hash value using the MD5 algorithm. How to decrypt the hash value using
the options listed below
A) Using same MD5 Algorithm
B) It is Not Possible to Decrypt Hash Value
C) Using Jce Decrypt
D) None of the Above
Questions 1:
40
Which of the algorithms is not supported to generate the checksum?
A) CRC32
B) MD2
C) SHA_256
D) RC2
Questions 2:
41
Which of the keystore types could support generating a symmetric key?
A) JCEKS
B) JKS
C) PGP
D) None of the above
Questions 3:
Meetup Feedback
43
● Share:
○ Tweet using the hashtag #MuleSoftMeetups #MuleMeetup
○ Invite your network to join: https://meetups.mulesoft.com/patna
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
● Nominate Yourself as Meetup Speaker:
○ Amazing opportunity to public speaking, broadening skills and expanding network
Knowledge Shared is Knowledge Squared!
Thank You !!!

More Related Content

Similar to CryptoGraphy Module in Mulesoft

Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyAhmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyShekh Muenuddeen
 
PGP managing Key Lecture 007
PGP managing Key Lecture 007PGP managing Key Lecture 007
PGP managing Key Lecture 007Qaisar Ayub
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxSanjeev Kumar Jaiswal
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionTanner Lovelace
 
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 Pgsodium's Features: those not provided by pgcrypto and integration with rem... Pgsodium's Features: those not provided by pgcrypto and integration with rem...
Pgsodium's Features: those not provided by pgcrypto and integration with rem...EDB
 
Encrption in mule
Encrption in muleEncrption in mule
Encrption in muleSindhu VL
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security muleSindhu VL
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Cryptography
CryptographyCryptography
CryptographyMilap Oza
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
PGP desk top basis lecture 002
PGP desk top basis lecture 002PGP desk top basis lecture 002
PGP desk top basis lecture 002Qaisar Ayub
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 

Similar to CryptoGraphy Module in Mulesoft (20)

Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptographyAhmadabad mule soft_meetup_17april2021_mule4_cryptography
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
 
PGP managing Key Lecture 007
PGP managing Key Lecture 007PGP managing Key Lecture 007
PGP managing Key Lecture 007
 
Unit 4
Unit 4Unit 4
Unit 4
 
Basics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linuxBasics of GnuPG (gpg) command in linux
Basics of GnuPG (gpg) command in linux
 
OpenPGP/GnuPG Encryption
OpenPGP/GnuPG EncryptionOpenPGP/GnuPG Encryption
OpenPGP/GnuPG Encryption
 
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 Pgsodium's Features: those not provided by pgcrypto and integration with rem... Pgsodium's Features: those not provided by pgcrypto and integration with rem...
Pgsodium's Features: those not provided by pgcrypto and integration with rem...
 
Encrption in mule
Encrption in muleEncrption in mule
Encrption in mule
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Asif
AsifAsif
Asif
 
Pgp
PgpPgp
Pgp
 
Cryptography
CryptographyCryptography
Cryptography
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Pgp1
Pgp1Pgp1
Pgp1
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Pgp
PgpPgp
Pgp
 
PGP desk top basis lecture 002
PGP desk top basis lecture 002PGP desk top basis lecture 002
PGP desk top basis lecture 002
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Encryption
EncryptionEncryption
Encryption
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 

More from shyamraj55

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
ServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxshyamraj55
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31shyamraj55
 
Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26shyamraj55
 
An overview of Anypoint API Community Manager
An overview of Anypoint API  Community ManagerAn overview of Anypoint API  Community Manager
An overview of Anypoint API Community Managershyamraj55
 
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMSimplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMshyamraj55
 
ChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftshyamraj55
 
Exploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex GatewayExploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex Gatewayshyamraj55
 
SNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfSNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfshyamraj55
 
CLI for DataWeave Scripts
CLI for DataWeave ScriptsCLI for DataWeave Scripts
CLI for DataWeave Scriptsshyamraj55
 
MuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsMuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsshyamraj55
 
MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14shyamraj55
 
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfSalesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfshyamraj55
 
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0shyamraj55
 

More from shyamraj55 (17)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
ServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptxServiceNow Integration with MuleSoft.pptx
ServiceNow Integration with MuleSoft.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
 
Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26Munit In Mule 4 | Patna MuleSoft Meetup #26
Munit In Mule 4 | Patna MuleSoft Meetup #26
 
An overview of Anypoint API Community Manager
An overview of Anypoint API  Community ManagerAn overview of Anypoint API  Community Manager
An overview of Anypoint API Community Manager
 
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOMSimplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
Simplifying Plugin & Dependency Management with POM, Parent-POM, and BOM
 
ChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoftChatGPT and Slack Integration with MuleSoft
ChatGPT and Slack Integration with MuleSoft
 
Exploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex GatewayExploring Universal API Management And Flex Gateway
Exploring Universal API Management And Flex Gateway
 
SNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdfSNS - SQS, and the MuleSoft liaison.pdf
SNS - SQS, and the MuleSoft liaison.pdf
 
CLI for DataWeave Scripts
CLI for DataWeave ScriptsCLI for DataWeave Scripts
CLI for DataWeave Scripts
 
MuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocsMuleSoft SAP Integration using IDocs
MuleSoft SAP Integration using IDocs
 
MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14MuleSoft Composer | Patna MuleSoft Meetup #14
MuleSoft Composer | Patna MuleSoft Meetup #14
 
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdfSalesforce, Slack, and Zendesk Integration with Mulesoft.pdf
Salesforce, Slack, and Zendesk Integration with Mulesoft.pdf
 
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0Patna MuleSoft Meetup Anypoint Cloudhub 2.0
Patna MuleSoft Meetup Anypoint Cloudhub 2.0
 

Recently uploaded

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

CryptoGraphy Module in Mulesoft

  • 1. 1 Patna Meetup will start shortly...meanwhile @Attendees: Kindly introduce yourself in Chat ● Name ● Company ● Location ● Mule Experience
  • 3. 3 ● Introduction ● Cryptography ● Crypto in Mulesoft ● Demo ● Q&A ● Meetup: Feedback & Upcoming Events Agenda
  • 4. 5 Meet your Patna Meetup Leaders
  • 5. 6 ● Both the speaker and host are organizing this meet up in individual capacity only. We are not representing our companies here. ● This presentation is strictly for learning purpose only. Organizer/Presenter do not hold any responsibility that same solution will work for your business requirements also. ● This presentation is not meant for any promotional activities. ● This meeting will be recorded and shared. Safe Harbour Statement
  • 6. 7 Today’s Meetup Speaker Sai Krishna Sanjapu ConvergeOne
  • 8. What is Cryptography? Cryptography is the science of writing in secret code so that no other person except the intended recipient could read Cryptography is the practice and study of techniques for secure communication in the presence of third parties. More generally, it is about constructing and analyzing protocols that overcome the influence of attackers or outside people and which are related to various aspects in information security such as data confidentiality, data integrity and authentication. It is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
  • 9. ..
  • 11. Cryptography Module in Mulesoft Functionalities in Crypto PGP JCE XML CheckSum
  • 12. Jce Encryption The JCE strategy enables you to use the wider range of cryptography capabilities provided by the Java Cryptography Extension. You can use cryptography capabilities in two ways: Password Based Encryption Key Based Encryption
  • 13. Jce Encrypt Pbe/Decrypt Pbe By using Given Algorithm and Password Jce Encrypt Pbe and Encrypt the data and gives the binary output and reverse Mechanism applies in Decryption
  • 14. Jce Encrypt It as two flavours Symmetric Encryption Asymmetric Encryption Symmetric Encryption Uses Secret Key for both Encryption and Decryption Process Supported KeyStore Formats are:: “JCEKS” “PKCS12” (JKS is not supported) > It is less secure and decryption time is very less Asymmetric Encryption uses Public key for Encryption and Private key as Decryption Supported Formats JKS,JCEKS,PKCS12 > It is More Secure but decryption time is slow compare to symmetric We can use openssl,keystore Explorer etc.. to generate Jave Cryptography Keys
  • 17. Keystore Explorer Note: For Symmetric key size of the key is very small and size changes based on the algorithm
  • 18. Jce Configuration In the Algorithm section Cipher and Algorithm and mutually Exclusive Connector By Default identifies public and private key based on password if password presents it is private key and it picks from keystore using store password as above
  • 19. CheckSum in Crypto Calculate checksum is use to calculate hash value by using SHA and MD5 Algorithms Validate checksum is used to validate the hashvalue in target system to check message Integrity if message is altered it will give Crypto:validation error
  • 20. Crypto in Dataweave Dataweave Supports Crypto Module it as various supported SHA and MD5 Algorithms We need to import “ import * from dw::Crypto“ in Dw Module
  • 21. JCE Sign Digital Signing Uses Internally digest(or)hashing Algorithm to generate Digest Value Message signing, on the other hand, uses the sender’s private key to encrypt the hash value and send the Signature to target system
  • 22. JCE Signature Validate In the validation component We need to pass our actual payload Which we need to validate to check Message Integrity and in mule the Datatype is String In the Expected tag configuration we Need to pass Sender Signature Value Note: All Mule Crypto Modules Support Detached Signatures Only
  • 23. PGP Cryptography Mule can encrypt all or part of a message using Pretty Good Privacy (PGP). PGP combines data compression and data encryption to secure messages. The compression reduces the size of the payload to help reduce the transmission time later on your application. ○ Encryption: Using another party’s public key to encrypt an outgoing message in a Mule app. ○ Decryption: Using your own private key to decrypt an incoming message in a Mule app.
  • 24. PGP Encryption/Decryption Flow PGP combines some of the best features of both conventional and public key cryptography. PGP is a hybrid cryptosystem PGP then creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type. This session key works with a very secure, fast conventional encryption algorithm to encrypt the plaintext; the result is ciphertext. Once the data is encrypted, the session key is then encrypted to the recipient's public key. This public key-encrypted session key is transmitted along with the ciphertext to the recipient. Decryption works in the reverse. The recipient's copy of PGP uses his or her private key to recover the temporary session key, which PGP then uses to decrypt the conventionally-encrypted ciphertext.
  • 27. Creation of PGP Key Pair We can use Kleopatra or GitBash to generate pgp key pair Once we give our name emailID and Algorithm,Key size and then select Create it will generate Public Key Private Key and FingerPrint and PassPhrase for you private Key
  • 28. Using Git Bash : Execute below commands to generate pgp key pair gpg --gen-key gpg --list-secret-keys --keyid-format LONG gpg --output F:pgp-keysmule_pub.gpg --export saikrishna1736@gmail.com gpg --export-secret-keys 46CCBC676154E2F9AA 1639BA0D14 > F:pgp-keysmule_private.gpg .asc “ASCII format” .gpg “Binary Format”
  • 29. Pgp Encrypt/Decrypt: We Use Public Key in Encrypt We Use Private Key in Decrypt
  • 30. Pgp Encrypt&Sign This component will do first Signing and Then will perform Encryption the returned Message as Signature inside its encrypted Contents for sigining.it uses Private key for sign and For encryption it uses Public key Note: Whenever we send Encrypt&Sign data For Pgp Decrypt we need to set “Validate if Signature found = true” in Pgp Decrypt So that component will able to take Public Key From Key configuration and Validate the Signature If validation Success it will give Decryption Payload
  • 31. Xml Encryption/Decryption Xml Encryption uses same Java KeyStore Configuration and uses Public key for Encryption and Private Key for decryption and we can use Element path is an XPath expression that identifies the element to encrypt or decrypt we can use symmetric and asymmetric Mechanism as per our need
  • 32. XML Sign Canonicalization Algorithm defines internal canonical algorithm mappings Detached Signatures we need to pass Element Path remaining modes its optional
  • 35. Q&A
  • 37. 38 ● All Questions will be Multiple Choice Questions. ● Respond answers in Chat Window. ● First correct answer for every question will be the winner for that question ● One voucher per month - Across All Meetups ● Note for Trivia Winners: ■ Make sure the host has your full name, email address and linkedIn profile before leaving ■ Voucher sent to winners within 10 days Trivia Rules
  • 38. 39 We have generated the hash value using the MD5 algorithm. How to decrypt the hash value using the options listed below A) Using same MD5 Algorithm B) It is Not Possible to Decrypt Hash Value C) Using Jce Decrypt D) None of the Above Questions 1:
  • 39. 40 Which of the algorithms is not supported to generate the checksum? A) CRC32 B) MD2 C) SHA_256 D) RC2 Questions 2:
  • 40. 41 Which of the keystore types could support generating a symmetric key? A) JCEKS B) JKS C) PGP D) None of the above Questions 3:
  • 42. 43 ● Share: ○ Tweet using the hashtag #MuleSoftMeetups #MuleMeetup ○ Invite your network to join: https://meetups.mulesoft.com/patna ● Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program ● Nominate Yourself as Meetup Speaker: ○ Amazing opportunity to public speaking, broadening skills and expanding network Knowledge Shared is Knowledge Squared!