当前位置:网站首页>Introduction to security encryption
Introduction to security encryption
2022-06-21 21:35:00 【JH_ Cao】
Catalog
Symmetric encryption


AES The key length of is 128、192、256 There are three kinds of . In symmetric encryption algorithm , For the moment AES Is safe . But there is a problem , How to distribute the key ? Transmission in the Internet environment , Keys are easy to steal . Generally speaking, there is 3 Key distribution methods :
1、 Private shared key
2、 Key distribution center send
3、 Asymmetric encryption To encrypt Symmetric encryption key
Asymmetric encryption
The general asymmetric encryption algorithm uses RSA Algorithm Generate key pair ( Public key pub_key、 Private key pri_key) Public keys are generally public , The private key is saved by yourself , No one else knows Characteristic is :
1、 Public key encrypted plaintext information , Only the corresponding private key can be decrypted ( For typical asymmetric encryption )
2、 The plaintext information encrypted by the private key , Only the corresponding public key can be decrypted ( For digital signature , I'll tell you more about it later )

certificate
1、 for instance : I have a driver's license in my life , Id card , Diploma, etc , These are issued by the authority , It can be used as proof of legitimacy .
2、 The public key may be counterfeited , In the process of using asymmetric encryption , Transfer the public key , There is still a threat to the security of asymmetric encryption .
3、 To address this threat , An authority is required to issue a certificate on whether the public key is legal
4、 Generally, these institutions are internationally recognized , Or some companies need to pay for certificates

Mixed encryption


digital signature
1、 Signatures in life , Such as signing a labor contract 、 Leave slip signed by the leader , The function is to show that it is operated by myself
2、 Empathy , Digital signatures on the Internet , It is the proof that the message was sent personally , Not forged or tampered with

边栏推荐
- 晶合集成通过注册:拟募资95亿 合肥建投与美的是股东
- 合并两个有序数组
- 2022年最新河南建筑施工电工(建筑特种作业)模拟试题及答案
- 自己动手写编译器:while,for,do等循环语句的中间代码生成
- 【MySQL·水滴计划】第三话- SQL的基本概念
- ASP. Net core creates razor page and uploads multiple files (buffer mode)
- 杰理之做蓝牙发射时,将立体声修改成单声道差分输出时,接收端出现卡音【篇】
- 免费又好用的参考文献管理软件zotero该怎么使用?可以同时支持中文和英文吗?...
- 30组户外旅行游玩VLOG记录LUTs调色预设Moody Travel LUTs
- Go language self-study series | golang standard library encoding/xml
猜你喜欢
随机推荐
ACM. HJ61 放苹果 ●
ACM. Hj51 outputs the penultimate node ●
测评 | 在生活中,你是一位什么样的人呢?
杰理之SD 卡复用 iic 注意问题【篇】
一行代碼可以做什麼?
30组户外旅行游玩VLOG记录LUTs调色预设Moody Travel LUTs
如何有序协同和管理多个研发项目?
Dedecms dream weaving background mailbox verification sending mail configuration tutorial
Mysql database transaction
NewOJ Week 6
杰理之配对成对耳后,想保持两个耳机都输出立体声【篇】
混合云演习常见案例
盐语Saltalk获800万美元A轮融资:继续扩大团队及市场覆盖
What can one line of code do?
Data visualization tool software
Tencent global digital ecology Conference - high speed intelligent computing special session!
集群一---LVS负载均衡集群NAT模式及LVS负载均衡实战部署
[microservices 7] in depth analysis of bestavailablerule source code of ribbon load balancing strategy
Xmind8 最新破解教程(亲测有用)
Mysql database - Database Foundation








