Support

Support levels

TrustPort Basic, free, for all customers

  • Updates via the internet
  • E-mail hot-line, Mon-Fri 8.00-16.00 CET
  • Helpdesk system

TrustPort VIP, prepaid, for business customers

  • Basic support included
  • Optional additional services
Support

 

Before you decide to contact support, we recommend that you try to find the information needed in the Technical FAQ and Sales FAQ.


Sales support:
sales@trustport.com

Technical support: support@trustport.com

Other queries:
info@trustport.com

Tel.: +420 541 244 471
Fax: +420 541 235 038

Postal address:

TrustPort a. s.
Purkyňova 2845/101
612 00 Brno, Czech Republic

Asymmetric cryptography

Asymmetric cryptography is used to encrypt data and also to create electronic signatures. During the coding process, different parts of the encryption key are used for the encryption of data, whilst other parts are used for decryption. Together, the two keys are referred to as a key pair. Encryption occurs with the help of the public key, and decryption occurs with the help of the private key.

Representatives of these algorithms are RSA, Diffie Hellman, and Algorithm of elliptical curves. The public part of the signed key is referred to as certification authority certificate. The advantage of these algorithms is the fact that the private part of the key does not need to be delivered to the communication counterpart, and therefore its disclosure is not a threat. The disadvantage is the speed of data processing, which is quite slower than that of the symmetric algorithms.