当前位置:网站首页>Brief introduction to SSL encryption process
Brief introduction to SSL encryption process
2022-06-27 08:37:00 【User 9407507】
1、 What is? SSL Encryption technology
SSL Our English full name is “Secure Sockets Layer” , In Chinese, “ Secure socket layer protocol layer ” , It's Netscape ( Netscape ) The company's proposal is based on WEB Application Security Protocol . SSL The protocol specifies an in application protocol ( Such as HTTP 、 Telenet 、 NMTP and FTP etc. ) and TCP/IP The protocol provides a mechanism for data security layering , It's for TCP/IP The connection provides data encryption 、 Server authentication 、 Message integrity and optional client authentication .
V**SSL 200 The device gateway is suitable for small and medium-sized enterprises , Meet its enterprise mobile users 、 branch 、 supplier 、 Enterprise resources such as partners ( Based on Web Application 、 Enterprise mail system 、 File server 、 C/S Application system, etc ) Secure access service . Enterprises use their own network platform , Create a secure enterprise private network . SSL V** Client applications are based on standards Web The encryption suite built in the browser and the server protocol provide the corresponding encryption method , That is, authorized users can access the server through the browser as long as they can surf the Internet SSL Safety tunnel .
2、SSL The encryption process
SSL The process of conversation SSL The conversation is mainly divided into three steps : 1. The client requests and verifies the certificate from the server ; 2. Both parties negotiate to generate “ session key ”; Pairing key 3. Both parties adopt “ session key ” Encrypted communication ;
3、 Encryption algorithm and protocol
3.1 Symmetric encryption Encryption and decryption use the same key Common encryption algorithms : DES、3DES、AES、Blowfish、Twofish、IDEA、RC6、CAST5 characteristic : 1、 encryption 、 Decryption uses the same key ; 2、 Divide the original data into fixed size blocks , Encrypt one by one ; defects : 1、 Too many keys ; 2、 Difficulty in key distribution ;
3.2 Public key encryption The key is divided into public key and private key Public key : Extract from the private key to produce ; Open to all ; Private key : Create... With tools , The user keeps it , It has to be private ;
characteristic : Data encrypted with the public key , Decryption can only be performed using the private key of the matching child ; vice versa ; purpose : digital signature : The main purpose is to let the receiver confirm the identity of the sender ; key exchange : The sender encrypts a symmetric key with the other party's public key , And send it to each other ; Data encryption :
3.3 One way encryption Fingerprint extraction of data ( Signature ); Encryption only , Cannot decrypt ; Common algorithms :md5、sha1
characteristic : Fixed length output 、 Avalanche effect ; function : integrity ;
3.4 key exchange IKE(Internet Key Exchange Internet key exchange ) 1. Public key encryption 2.DH(Deffie-Hellman Baron of hell )
4.PKI PKI yes Public Key Infrastructure An acronym for , Public key infrastructure ;PKI It is a standard technology and specification that uses public key encryption technology to provide a set of security basic platform for the development of e-commerce .
边栏推荐
- 关于el-date-picker点击清空参数变为null的问题
- Analysis of orthofinder lineal homologous proteins and result processing
- JVM common garbage collector
- A classic interview question covering 4 hot topics
- The most direct manifestation of memory leak
- RockerMQ消息发送与消费模式
- Imx8qxp DMA resources and usage (unfinished)
- Rough reading DS transunet: dual swing transformer u-net for medical image segmentation
- 多网络设备存在时,如何配置其上网优先级?
- i=i++;
猜你喜欢

我大抵是卷上瘾了,横竖睡不着!竟让一个Bug,搞我两次!

MATLAB小技巧(18)矩阵分析--熵权法

Design of a solar charge pump power supply circuit

The markdown plug-in of the browser cannot display the picture

This, constructor, static, and inter call must be understood!

0号进程,1号进程,2号进程

并发编程JUC的AQS底层源码

Redis master-slave replication and sentinel mode
![[cloud native] 2.3 kubernetes core practice (Part 1)](/img/f8/dbd2546e775625d5c98881e7745047.png)
[cloud native] 2.3 kubernetes core practice (Part 1)

Flow chart of Alipay wechat payment business
随机推荐
MySQL环境变量配置的教程
Today's three interviews demo[integer ASCII class relationship]
關聯GIS:條條道路通UE5城
SPARQL basic introductory exercise
数据类型占内存大小?LongVsObject
MATLAB小技巧(19)矩阵分析--主成分分析
(original) custom drawable
ServletConfig与ServletContext
粗读DS-TransUNet: Dual Swin Transformer U-Net for Medical Image Segmentation
The markdown plug-in of the browser cannot display the picture
Mysql事务中MVCC理解超简单
sql注入之order by注入
我大抵是卷上瘾了,横竖睡不着!竟让一个Bug,搞我两次!
0号进程,1号进程,2号进程
支付宝微信支付业务流程图
2022.6.26-----leetcode. seven hundred and ten
2022.06.26 (LC Luo 6101 Luo determines whether the matrix is an X matrix)
[cloud native] 2.3 kubernetes core practice (Part 1)
【每日一练】产品卡片动画效果的实现
AQS underlying source code of concurrent programming JUC