当前位置:网站首页>Brief introduction to SSL encryption process
Brief introduction to SSL encryption process
2022-06-27 08:37:00 【User 9407507】
1、 What is? SSL Encryption technology
SSL Our English full name is “Secure Sockets Layer” , In Chinese, “ Secure socket layer protocol layer ” , It's Netscape ( Netscape ) The company's proposal is based on WEB Application Security Protocol . SSL The protocol specifies an in application protocol ( Such as HTTP 、 Telenet 、 NMTP and FTP etc. ) and TCP/IP The protocol provides a mechanism for data security layering , It's for TCP/IP The connection provides data encryption 、 Server authentication 、 Message integrity and optional client authentication .
V**SSL 200 The device gateway is suitable for small and medium-sized enterprises , Meet its enterprise mobile users 、 branch 、 supplier 、 Enterprise resources such as partners ( Based on Web Application 、 Enterprise mail system 、 File server 、 C/S Application system, etc ) Secure access service . Enterprises use their own network platform , Create a secure enterprise private network . SSL V** Client applications are based on standards Web The encryption suite built in the browser and the server protocol provide the corresponding encryption method , That is, authorized users can access the server through the browser as long as they can surf the Internet SSL Safety tunnel .
2、SSL The encryption process
SSL The process of conversation SSL The conversation is mainly divided into three steps : 1. The client requests and verifies the certificate from the server ; 2. Both parties negotiate to generate “ session key ”; Pairing key 3. Both parties adopt “ session key ” Encrypted communication ;
3、 Encryption algorithm and protocol
3.1 Symmetric encryption Encryption and decryption use the same key Common encryption algorithms : DES、3DES、AES、Blowfish、Twofish、IDEA、RC6、CAST5 characteristic : 1、 encryption 、 Decryption uses the same key ; 2、 Divide the original data into fixed size blocks , Encrypt one by one ; defects : 1、 Too many keys ; 2、 Difficulty in key distribution ;
3.2 Public key encryption The key is divided into public key and private key Public key : Extract from the private key to produce ; Open to all ; Private key : Create... With tools , The user keeps it , It has to be private ;
characteristic : Data encrypted with the public key , Decryption can only be performed using the private key of the matching child ; vice versa ; purpose : digital signature : The main purpose is to let the receiver confirm the identity of the sender ; key exchange : The sender encrypts a symmetric key with the other party's public key , And send it to each other ; Data encryption :
3.3 One way encryption Fingerprint extraction of data ( Signature ); Encryption only , Cannot decrypt ; Common algorithms :md5、sha1
characteristic : Fixed length output 、 Avalanche effect ; function : integrity ;
3.4 key exchange IKE(Internet Key Exchange Internet key exchange ) 1. Public key encryption 2.DH(Deffie-Hellman Baron of hell )
4.PKI PKI yes Public Key Infrastructure An acronym for , Public key infrastructure ;PKI It is a standard technology and specification that uses public key encryption technology to provide a set of security basic platform for the development of e-commerce .
边栏推荐
- Some considerations on operation / method overloading for thread to release lock resources
- win10为任意文件添加右键菜单
- sql注入之order by注入
- this,构造器,静态,之间调用,必须搞懂啊!
- See how much volatile you know
- Fake constructor???
- Redis master-slave replication and sentinel mode
- 关于el-date-picker点击清空参数变为null的问题
- i=i++;
- How much do you know about the cause of amplifier distortion?
猜你喜欢

MATLAB小技巧(19)矩阵分析--主成分分析

Lvgl GUI guide porting code to stm32

MySQL锁详解

C # solve the relative path problem using SQLite

即构「畅直播」,全链路升级的一站式直播服务
![[MySQL basic] general syntax 1](/img/f2/fb38409c034546e503d08a0b96cc61.png)
[MySQL basic] general syntax 1

SPARQL basic introductory exercise
![[cloud native] 2.3 kubernetes core practice (Part 1)](/img/f8/dbd2546e775625d5c98881e7745047.png)
[cloud native] 2.3 kubernetes core practice (Part 1)

Design of a solar charge pump power supply circuit

Refer to | the computer cannot access the Internet after the hotspot is turned on in win11
随机推荐
Fake constructor???
枚举?构造器?面试Demo
Ready to migrate to the cloud? Please accept this list of migration steps
RockerMQ消息发送与消费模式
MySQL环境变量配置的教程
SQL Sever column name or number of supplied values does not match the table definition
使线程释放锁资源的操作/方法重载一点注意事项
【每日一练】产品卡片动画效果的实现
Imx8qxp DMA resources and usage (unfinished)
Oracle uses an SQL to find out which data is not in a table
即构「畅直播」,全链路升级的一站式直播服务
MATLAB小技巧(18)矩阵分析--熵权法
DataV轮播表组件dv-scroll-board宽度问题
The difference between ArrayList and LinkedList
看看volatile你深知多少
[MySQL basic] general syntax 1
MySQL锁详解
AQS underlying source code of concurrent programming JUC
[batch dos-cmd command - summary and summary] - parameters%0,%1,%2,%[0-9],%0-9 in the batch command and batch command parameter position switching command shift, operator% usage in the DOS command
Redis installation under Linux