What is AS2 or Applicability Statement 2 ?
Applicability Statement 2 or AS2 is a specification using which data can be exchanged securely using even an unencrypted HTTP connection. It works like an envelope in which data can be embedded and transferred securely.
AS2 is suitably used for EDI transactions. EDI or Electronic Data Interchange is an electronic communication method using which two different companies or organizations can electronically exchange documents, such as purchase orders, invoices, shipping notices, etc. AS2 can be used to make EDI transactions more secure.
How does AS2 protocol work ?
To exchange data using AS2, both the sender and the receiver need to use communication software in their systems. Using the software, the sender first digitally signs the document so that the document cannot be tampered with. After that, the signed document is encrypted and sent to the receiver. The encrypted document also contains a request for the receipt from the receiver.
The receiver receives the signed and encrypted document. He first decrypts it and then verifies the signature of the sender. After successful validation, a signed receipt is sent by the receiver back to the sender
An HTTP POST is used to send the data to the receiver. The request URI identifies the process which will be used to unpack and handle the data and then to generate a reply. The receipt can be sent either with the HTTP Response body or by using a new HTTP POST operation.
So, to summarize, data exchange using AS2 typically follows the steps below :
- The sender first signs the document using his private key and then, encrypts it using S/MIME.
- The document also specifies that a signed receipt has to be sent back to the sender.
- The signed and encrypted document is then sent through an HTTP connection. Please note that though an HTTP connection is unsecured, the document remains secure as it is signed and encrypted using strong cryptographic keys.
- The receiver receives the document and decrypts it using his private key.
- The receiver verifies the signature using the public key of the sender.
- On successful validation, the receiver creates a receipt and signs it using his private key. The signed receipt also contains the hash of the received message so that the sender can be sure that the sent document was successfully decrypted and validated by the receiver.
So, even though an HTTP connection is unsecured, a document can be sent securely using AS2.
0 Comments