当前位置:网站首页>Cyberspace Security penetration attack and defense 9 (PKI)
Cyberspace Security penetration attack and defense 9 (PKI)
2022-07-25 13:00:00 【Shany-Ming】
Chapter 15 PKI
1.PKI name , Function and composition
name :Public Key Infrastructure Public key infrastructure
effect : Ensure the security of information through encryption technology and digital signature
form : Public key cryptography , digital certificate ,CA,RA
2. Three elements of information security
Confidentiality
integrity
Authentication / Non repudiation of operation
3. be used PKI Of IT field
1)SSL/HTTPS
2)IPsecVPN
3) Partial remote access VPN
4. Public key cryptography
effect : Realize the encryption of information , Digital signature and other security
encryption algorithm :
1) Symmetric encryption algorithm
The encryption and decryption keys are consistent
DES 3 DES AES
x+5=y( Symmetric encryption algorithm )
x It's the original data / original text
y It's ciphertext
5 It's the key
2) Asymmetric encryption algorithm
Each communication party needs a pair of public and private keys
Both parties exchange public keys
Public key and private key are mutually encrypted
Public and private keys cannot be pushed against each other
RSA DH

3) The hash algorithm ( Irreversible algorithm , Verify integrity )
It mainly uses MD5,SHA
In the asymmetric encryption algorithm, the unencrypted ciphertext will be hash Work out hash Value and then send it together after the encrypted ciphertext , Decryption also needs to take out the later hash Value and then decrypt , After decryption hash, If you take out hash Value and decryption hash Of hash The same value indicates that the file has not been tampered . Post upgrade directly to ciphertext hash.
The threat is : If someone changes the ciphertext during transmission , And delete the following hash value , Re hash Put it in the tail , Then the receiver will think that the ciphertext has not been tampered with
upgrade : Pair generated hash Value is encrypted again , As shown in the figure above hash Value to use RSA And silly private key cba Encrypt again and put it at the end , Then two fools use the public key they get (abc) Decrypt hash value
5. digital signature
To ciphertext hash Then use your own private key encryption algorithm to hash Value encryption , This is digital signature
6.CA And RA
. CA Used to issue a certificate , and RA Used to verify the identity of the applicant , There is only one subject who verifies the right body ,CA To issue a certificate .. ordinary DV The certificate may only need to verify the ownership of the domain name , and EV/OV The certificate also needs to verify the identity of the subject ( Like ID card 、 Business license and so on ).. Therefore, the work of the verification subject is very cumbersome , difficult , Unable to automate , Therefore, it is necessary to separate RA Come out and undertake this complex work .. From the actual structure , Maybe one. CA Corresponding multiple RA Many at this time RA After completing the principal validation , Submit the certificate issuance request to CA Generate Certificate .. A simpler case may also be caused by CA Undertake the function of verification , At this time, he is CA, It's also RA
In the information transmission of big silly and two silly , Right between the two CA Intervention .
边栏推荐
- "Autobiography of Franklin" cultivation
- State mode
- 【OpenCV 例程 300篇】239. Harris 角点检测之精确定位(cornerSubPix)
- 软件测试面试题目:请你列举几个物品的测试方法怎么说?
- AtCoder Beginner Contest 261 F // 树状数组
- Eccv2022 | transclassp class level grab posture migration
- Leetcode 1184. distance between bus stops
- Word style and multi-level list setting skills (II)
- 零基础学习CANoe Panel(15)—— 文本输出(CAPL Output View )
- Chapter5 : Deep Learning and Computational Chemistry
猜你喜欢

【Rust】引用和借用,字符串切片 (slice) 类型 (&str)——Rust语言基础12

AtCoder Beginner Contest 261E // 按位思考 + dp

LeetCode 0133. 克隆图

Microsoft proposed CodeT: a new SOTA for code generation, with 20 points of performance improvement
![[today in history] July 25: IBM obtained the first patent; Verizon acquires Yahoo; Amazon releases fire phone](/img/f6/d422367483542a0351923f2df27347.jpg)
[today in history] July 25: IBM obtained the first patent; Verizon acquires Yahoo; Amazon releases fire phone

Shell常用脚本:检测某域名、IP地址是否通

B树和B+树

2022.07.24 (lc_6124_the first letter that appears twice)

Mid 2022 review | latest progress of large model technology Lanzhou Technology

想要白嫖正则大全是吧?这一次给你个够!
随机推荐
[fluent -- example] case 1: comprehensive example of basic components and layout components
JS sorts according to the attributes of the elements in the array
Synergetic process
Selenium uses -- XPath and analog input and analog click collaboration
Shell Basics (exit control, input and output, etc.)
7行代码让B站崩溃3小时,竟因“一个诡计多端的0”
SSTI 模板注入漏洞总结之[BJDCTF2020]Cookie is so stable
2022 Henan Mengxin League game (3): Henan University I - Travel
ORAN专题系列-21:主要的玩家(设备商)以及他们各自的态度、擅长领域
[operation and maintenance, implementation of high-quality products] interview skills for technical positions with a monthly salary of 10k+
【C语言进阶】动态内存管理
yum和vim须掌握的常用操作
"Autobiography of Franklin" cultivation
[problem solving] ibatis.binding BindingException: Type interface xxDao is not known to the MapperRegistry.
Use of hystrix
我想问DMS有没有定时备份某一个数据库的功能?
Moving Chinese figure liushenglan
如何理解Keras中的指标Metrics
mysql有 flush privileges 吗
Deployment of Apache website services and implementation of access control