当前位置：网站首页>Detailed explanation of information abstract, digital signature, digital certificate, symmetric encryption and asymmetric encryption
Detailed explanation of information abstract, digital signature, digital certificate, symmetric encryption and asymmetric encryption
2022-04-23 16:40:55 【GokuCode】
The information in this paper, 、 digital signature 、 digital certificate 、 Symmetric encryption and asymmetric encryption
Anti theft statement ： Other websites found that they were pirated
The only link to this article ：https://blog.csdn.net/weixin_44331765/article/details/124220044
- The information in this paper, 、 digital certificate 、 What is the use of symmetric encryption and asymmetric encryption , Why do you need these .
Let's use a small example to illustrate .
Three characters ： the Red Army 1、 the Red Army 2、 Blue army
Scenario description ： the Red Army 1 To the Red Army 2 Send a message saying to launch an attack , With the sending scenario .
scene 1： Plaintext transmission information
At first , The Red Army did not realize the importance of information security , So direct plaintext transmission of information . therefore , It was soon acquired by the Blues , Then the red army fought and lost again and again .
You can see that if the blue army intercepts intelligence , You can immediately see what the content is , Because the red army uses clear text transmission .
scene 2： Symmetric encryption
Symmetric encryption ： Use key A encryption , Decryption also uses A The key is symmetric encryption . Specific details can be searched by yourself .
Then tell the story , After the Red Army found that it was intercepted by the blue army , Prepare to use symmetric encryption . So the key is used A. As a result, the key was monitored during transmission . The blues got the key A.
scene 3: Use asymmetric encryption
Asymmetric encryption ： Use public key encryption （ In fact, it's not called encryption , Because it's a public key , So it's an open secret , So it's called signature , That is, digital signature ）, Only the private key can be decrypted , Similarly, using the private key to encrypt , Only public key decryption can be used .
Realization principle ：
the Red Army 1: Private key a1 Public key a2
the Red Army 2: Private key b1 Public key b2
The Red Army wanted to ： Even if the blues get information encrypted with a public key , It can't be cracked , Because it has no private key . The Blues... But they don't , It can do this ：
The blues know and make their own Private key w1 Public key w2. So there was a situation .
The Blues have become middlemen , There will be such a process of sending messages
the Red Army 1： Use w2 Encrypted messages Blue army ： After receiving the message, use w1 Decrypt Use b2 The encrypted message is sent to the user 2 the Red Army 2： Received and used b1 Decrypt The middle Red Army 12 No problem , The blue army can also get information .
scene 4: Using digital certificates
The Red Army found a blue middleman , So we need to improve the encryption method , In order to let the other party know that the public key is his own , The public key cannot be tampered with , So digital certificates are used . the Red Army 1 Certificate used , Certificate information mainly includes the following contents ：
Digital certificate version ：1.0 name ： the Red Army 1 Belongs to ： World War II only id:xxxxa1 Public key ：a1 Detailed introduction ： The army is xxxx Omit here 1 swastika Certificate size ：100M
But to the Red Army 2, Not yet. , Because of this, if some part of the certificate, especially the public key, is tampered with , What if it's forged by the blue army . Still can't prove . Then you need to use encryption to ensure that the data is not tampered with . Use md5 To encrypt , If one content is changed , that md5 The value will also change .
Digital certificate version ：1.0 name ： the Red Army 1 Belongs to ： World War II only id:xxxxa1 Public key ：a1 Detailed introduction ： The army is xxxx Omit here 1 ten thousand Certificate size ：100M Yes 100M After data encryption ：xjajaksd89as7df89asdf67asd78a7ds
For the above encryption , the Red Army 1 Find out , The encrypted content is too long , A certificate 1 More than ten thousand words , It takes half an hour to complete the encryption . Too slow , Can you put forward some important , To encrypt , Improve encryption speed . So there was The information in this paper, , We propose to use the private key to sign hundreds of words, that is, digital signature , It's like an abstract in a paper , As long as we read a few hundred word abstract, we will know what this paper is about .
So this also needs the algorithm of information summary extraction （ Interested in self searching ）
The encrypted content becomes smaller , Encryption speed is also fast . It can also ensure data integrity
Digital certificate version ：1.0 name ： the Red Army 1 Belongs to ： World War II only id:xxxxa1 Public key ：a2 Detailed introduction ： The army is xxxx Omit here 1 ten thousand Certificate size ：100M The information in this paper, ：1kb the Red Army 1 Use the private key pair 1kb Data signature ：xjajaksd89as7df89asdf67asd78a7ds
But to prove this certificate is the Red Army 1 Yes or no , Because if the middle is modified by the Blues , the Red Army 2 I can't find out .
Digital certificate version ：1.0 name ： the Red Army 1 Belongs to ： World War II only id:xxxxa1 The blue army modified the public key ：w2 <---------------- The blues moved their hands and feet Detailed introduction ： The army is xxxx Omit here 1 ten thousand Certificate size ：100M The information in this paper, ：1kb Blue army private key re signature ：xwwwwksd8wwdf89asdf67asd78a7ds <---------------- The blues moved their hands and feet
To the Red Army 2, the Red Army 2 I can't find out .
This is the time , The Red Army is going to find the headquarters . Everyone at headquarters has a public key , Can be obtained from the Red Army Headquarters . That is, the Red Army 2 The headquarters knows in advance z2
So the Red Army 1 Give the certificate to the headquarters , The headquarters signs with its own private key
Digital certificate version ：1.0 name ： the Red Army 1 Belongs to ： World War II only id:xxxxa1 the Red Army 1 Public key ：a2 Detailed introduction ： The army is xxxx Omit here 1 ten thousand Certificate size ：100M The information in this paper, ：1kb Headquarters private key signature ：xwwwwksd8wwdf89asdf67asd78a7ds
This is the time , Even if the blues get it, they can't modify it , Because the Red Army 2 There is a public key of the headquarters , If the information is modified , The Blues have no headquarters , So I can't sign , Even if you sign , Public key z2 Can't decrypt the signature , So the Red Army 2 It can be said that this is not the Red Army 1 Certificate
The general picture
- JMeter installation tutorial and solutions to the problems I encountered
- UWA Pipeline 功能详解｜可视化配置自动测试
- Server log analysis tool (identify, extract, merge, and count exception information)
- Execution plan calculation for different time types
- Custom implementation of Baidu image recognition (instead of aipocr)
- MySQL personal learning summary
- Use itextpdf to intercept the page to page of PDF document and divide it into pieces
Detailed explanation of UWA pipeline function ｜ visual configuration automatic test
Detailed explanation of file operation (2)
计组 | 【七 输入/输出系统】知识点与例题
英语 | Day15、16 x 句句真研每日一句（从句断开、修饰）
New project of OMNeT learning
- 如何建立 TikTok用户信任并拉动粉丝增长
- loggie 源码分析 source file 模块主干分析
- Dlib of face recognition framework
- NVIDIA graphics card driver error
- Installation and management procedures
- 5-minute NLP: text to text transfer transformer (T5) unified text to text task model
- Easyexcel reads the geographical location data in the excel table and sorts them according to Chinese pinyin
- MySQL master-slave synchronization pit avoidance version tutorial
- Construction of promtail + Loki + grafana log monitoring system
- Public variables of robotframework
- File upload and download of robot framework
- Selenium IDE and XPath installation of chrome plug-in
- Project framework of robot framework
- Use case execution of robot framework
- Use case labeling mechanism of robot framework
- Deepinv20 installation MariaDB
- Pycham connects to the remote server and realizes remote debugging
- DDT + Excel for interface test
- Pytorch: the pit between train mode and eval mode
- Introduction to how to set up LAN
- Loggie source code analysis source file module backbone analysis
- How to choose the wireless gooseneck anchor microphone and handheld microphone scheme
- How to build tiktok user trust and drive fan growth
- 【PIMF】OpenHarmony啃论文俱乐部—在ACM Survey闲逛是什么体验
- Kunteng full duplex digital wireless transceiver chip kt1605 / kt1606 / kt1607 / kt1608 is suitable for interphone scheme
- English | day15, 16 x sentence true research daily sentence (clause disconnection, modification)
- Knowledge points and examples of [seven input / output systems]
- How does flash cache data in memory?
- 博士申请 | 厦门大学信息学院郭诗辉老师团队招收全奖博士/博后/实习生
- ACL 2022 | DialogVED：用于对话回复生成的预训练隐变量编码-解码模型
- True math problems in 1959 college entrance examination
- MySQL master-slave replication