DEXDash™ Copilot - Beta Testing - Pre-release & Discount Pricing Coming Soon!

myZure LLC
myZure LLC
  • Home
  • Features
    • Starter Edition
    • Pro Edition
    • Web Edition
  • Start Here
    • 1 - Download & Install
    • 2 - Start & Personal PIN
    • 3 - Get License From Web
    • 4 - Set Security Policies
    • 5 - Setup Users & eMail
    • 6 - Import Demo Bookmarks
    • Program Access Control
  • Demo
  • Tutorial
    • Navigation
    • Starter
    • Pro
    • Web
  • Buy
    • Pricing
    • Store
  • myZure LLC
    • About Us
    • Contact Us
  • More
    • Home
    • Features
      • Starter Edition
      • Pro Edition
      • Web Edition
    • Start Here
      • 1 - Download & Install
      • 2 - Start & Personal PIN
      • 3 - Get License From Web
      • 4 - Set Security Policies
      • 5 - Setup Users & eMail
      • 6 - Import Demo Bookmarks
      • Program Access Control
    • Demo
    • Tutorial
      • Navigation
      • Starter
      • Pro
      • Web
    • Buy
      • Pricing
      • Store
    • myZure LLC
      • About Us
      • Contact Us
  • Sign In
  • Create Account

  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Features
    • Starter Edition
    • Pro Edition
    • Web Edition
  • Start Here
    • 1 - Download & Install
    • 2 - Start & Personal PIN
    • 3 - Get License From Web
    • 4 - Set Security Policies
    • 5 - Setup Users & eMail
    • 6 - Import Demo Bookmarks
    • Program Access Control
  • Demo
  • Tutorial
    • Navigation
    • Starter
    • Pro
    • Web
  • Buy
    • Pricing
    • Store
  • myZure LLC
    • About Us
    • Contact Us

Account


  • Orders
  • My Account
  • Sign out


  • Sign In
  • Orders
  • My Account

dexDASH ASYMMETRIC generates KEYs

What is Asymmetric cryptography and keys?

  • Asymmetric cryptography, also known as public-key cryptography, is a process that DEXDash uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
    • A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's initiator.
    • DEXDash makes asymmetric keys. When someone wants to send an encrypted message, they can pull the intended recipient's public key from a DEXDash and use it to encrypt the message before sending it. The recipient of the message can then decrypt the message using their related private key.
      • If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not need to physically lock and unlock the message.
      • Asymmetric keys, also known as public/private key pairs, are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures. Asymmetric encryption uses public key encryption algorithms.


  • When one key of a key pair is used to encrypt a message, the other key from that pair is required to decrypt the message. 
    • Thus if user A's public key is used to encrypt data or message, only user A (or someone who has access to user A's private key) can decrypt the data or message. 
    • If user A's private key is used to encrypt a piece of data or message, only user A's public key will decrypt the data or message, thus indicating that user A (or someone with access to user A's private key) did the encryption.

Return to Web Features

ASYMMETRIC KEYS FEATURE

Feature Description

Secret Seed Phrase - Asymmetric (Public/Private) Keys


  • DEXDash Asymmetric Key Feature Tour:
    • Enter Secret Phrase - can be any length or character string
    • Generate Public/Private Keys with one-click
    • Generate QR Codes with one-click
      • Secret Phrase QR
      • Public Key QR
      • Private Key QR
    • Creates .PNG files for Secret and Keys
      • Show list of .PNG files in \SCIF folder
      • Copy files or Print for hardcopy reference
    • Email Wizard
      • Copy and Paste "Public Key" to send to recipients.
      • NEVER SHARE "PRIVATE KEY"
    • Clear Secret and Keys from screen with one-click
    • Remove (Delete) .PNG QR files to protect from exploitation
    • Larger QRs
      • View larger QRs to visually scan with phone or other device from screen image
    • Validate Keys Cypher
      • Include Description of Keys
      • Validate Cypher Keys by entering text to encrypt, text is encrypted using the Public Key and then Decrypted using the Private Key displaying the resulting validation.

"How To" Tutorial - Step-by-Step:

Open Keys Browse List


  1. click to Open Asymmetric Key list browse
  2. select/highlight  a record in the list
  3. double left mouse click the record
  4. Key Record panel appears


Keys Button

  • Generate Asymmetric Public/Private Keys


QRs Button

  • Generate QRs for My Secret Phrase, Public Key, Private Key


Show Button

  • List Key QR Image Files Generated (.PNG) in SYSTEMData Folder


Email Button

  • Start eMail Wizard


Clear Button

  • Clear values from fields on panel


Remove Button

  • Deletes QRs Image files (.PNG) from device storage


Larger QRs Tab

  • Show Larger QR Images


Validate Keys Cypher Tab

  • Validate the Public/Private key Cypher Encryption & Decryption
    • Enter "Text to Encrypt" 
    • Click Validate
    • Validate encrypts the string with Public Key then Decrypts with Private key.
    • Resulting in a match of "Text To Encrypt" with "Decrypted Text" 
      • If Validate is successful both strings entered will match.


Notes/Images Tab

  • Enter Notes & Images- [Ctrl+V] to paste and images to field 


ASYMMETRIC KEYS - Feature Gallery Images

Asymmetric Keys

    Copyright © 2023 myZure LLC - All Rights Reserved.

    DEXDash™ Copilot is Designed for Windows™ 11

    • Home
    • Pricing
    • Store
    • Contact Us
    • Privacy Policy
    • Terms of Service

    This website uses cookies.

    We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

    DeclineAccept