In general the term Crypto means to maintain the secrecy, privacy and encryption and API stands for Application program interface, it is a set of routine, procedure and tools for developing software applications.
The Cryptography API encloses functions that permit applications to encrypt or digitally sign data in a supple method, while providing building a shield for the costumer’s responsive private key data. The entire cryptographic operations are carried by independent modules known as cryptographic service providers (CSPs). Each CSP provides a diverse execution of the Cryptography API layer. Some provide robust cryptographic algorithms, while others contain hardware components such as smart cards. Additionally, some CSPs may infrequently communicate with users directly, such as when they have to perform a digital signature using the user's signature private key.
Each CSP has its own key database in which it stores its unrelenting cryptographic keys. Each key database contains one or more key container, every key contains all the pairs belonging to a precise user or Cryptography API client. They are provided with a unique name, which applications provide to the CryptAcquireContext function when gathering a handle to the key container.
The CSP stores every key container from time to time, that includes all the public/private key pairs it contains. However, session keys are not conserved from session to session. Even though it is possible to discover these keys on a computer, they are stored in an encrypted and locked format.
Usually, a default key container is designed for each client. This key container takes the user's log in name as its own name, which is then operated by any numerous of applications. It is also possible for an application to generate its own key container and key pair which it generally named after itself.
© 2012-2018 All Rights Reserved | Awapal Solutions Pvt. Ltd.