当前位置:网站首页>Network security algorithm
Network security algorithm
2022-06-25 18:13:00 【[email protected]】
List of articles
1. Shared key encryption
- Both encryption and decryption use the same key
- Also known as symmetric encryption
Data transfer process :
- A Prepare to B send data
- To prevent eavesdropping ,A Use the key to encrypt the data before sending it to B
- B After receiving the encrypted data, decrypt the data with the same key
The problem is :
- If A and B No direct communication , You need to transfer the key through the future , If the key is X hacking ,X You can crack the ciphertext
2. Public key encryption
- Encryption and decryption use different keys
- The encryption is called public key
- The decryption is called private key
Data transfer process :
- A Prepare to B send data
- Receiving party B Generate public and private keys , And send the public key to A
- A Use B The sent public key encrypts the data
- A Send encrypted data to B,B Then decrypt the ciphertext with the private key
- Even if there is something like “ Symmetric encryption ” Problems caused by process sending , That is, the key sent through the network is eavesdropped , But the public key is sent here , Even if it is eavesdropped, the data cannot be cracked
The problem is :
- Public key encryption has the problem of public key reliability
- A Prepare to B send data
- Receiving party B Generate public and private keys , And send the public key to A
- In the key from B->A In the process of ,X The public key of the transmission process is replaced by its own public key , take X The public key of is sent to A
- A Use X To encrypt data and send it to B
- X Eavesdropping A Data sent , Because the data is generated by X Public key encryption , therefore X You can use your own private key to decrypt , So it's cracked , meanwhile X Use B After encrypting the data with the public key of, send it to B, such B Will not be aware that the data has been eavesdropping
- Solving this problem requires digital certificates
1. There is a problem with the shared key that the key cannot be transferred securely
2. Public key encryption has the problem of slow encryption and decryption
3. Mixed encryption
- Encrypt the data with a symmetric key
- Use public key encryption for the key
4. Message authentication code
- The message authentication code can detect whether the message has been tampered
- Using shared key encryption
- A When sending a message ,A Use ciphertext and key to generate a value , Send values and ciphertext together
- B When receiving a message , The ciphertext and key are also used to generate a numerical value , Judge the value and A Whether the values sent are the same , If not, the data is tampered with
The problem is :
A、B Both sides can encrypt the message and calculate the verification code , It is impossible to prove that the original message is A What is generated is still B Generated
5. digital signature
- In public key encryption , Encryption uses a public key P, Decryption uses a private key S, Anyone can use a public key to encrypt data , Only the person holding the private key can decrypt
- The method of digital signature is the opposite of that of domain public key
- sender A Ready to send messages , Public and private keys ( Public key encryption is the recipient B Prepare the public and private keys )
- A Send the public key to B
- A Use the private key to encrypt a summary of the data ( The abstract can be used as hash Function generation ), The encrypted digest is the digital signature
- A Send the encrypted data together with the digital signature to B
- B After receiving the data and digital signature , Decrypt the digital signature with the public key to get the abstract 1, Decrypt the message with the public key to get the plaintext , use hash The function processes the plaintext to get the digest 2, Comparison summary 1 And summary 2 You can judge whether the message has been tampered with 、 By A send out 、 Prevention of hindsight denial
The problem is :
After using data signature B Will believe that the sender of the message is A, But it could actually be X Pretending to be A
The reason is that public key encryption cannot confirm who the key is made by
6. digital certificate
- Neither public key encryption nor digital signature can guarantee that the public key actually comes from the sender of the information , therefore , Even if the public key is maliciously replaced by a third party , Nor will the recipient notice
- A Now send the public and private keys to B
- A You need to go to the certification center first CA Apply for a certificate , Proof public key P It's your own.
- authentication center CA Kept in A The public and private keys of
- CA authentication A Information ( mailbox 、 Id card ), Confirmation is A My information , authentication center CA Use your own private key , according to A Data and public key to generate digital signature , meanwhile CA Also saved A Information and digital signature
- B Received A After sending the message and digital signature , use CA Public key decryption A Digital signature of , obtain A Information and public key
- If in the process X counterfeit A Send public key and digital signature ,B Use CA The decrypted information of the public key does not conform to A Information about
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/02/202202190532337685.html
边栏推荐
- Which is better and safer, GF easy gold rush or compass
- conda安装的py3.6和py3.7
- Interrupt operation: abortcontroller learning notes
- 1、对范数的理解
- Can I open an account? Is it safe to open an account
- 1. Understanding of norm
- Android Internet of things application development (smart Park) - picture preview interface
- What is an operator?
- Virtual machine class loading mechanism
- 卷积操作的本质特性+TextCNN文本分类
猜你喜欢

Using QT to make a beautiful login interface box

lock

SDN system method | 9 Access network

SDN系统方法 | 9. 接入网

篇6:CLion:Toolchains are not configured Configure Disable profile

什么是算子?
![[machine learning] case study of college entrance examination prediction based on multiple time series](/img/d8/a367c26b51d9dbaf53bf4fe2a13917.png)
[machine learning] case study of college entrance examination prediction based on multiple time series

SQL Server实时备份库要求

CentOS7 安装 Redis 7.0.2

New characteristics of cultural consumption in the era of digital economy
随机推荐
广发易淘金和指南针哪个更好,更安全一些
Part 5:vs2017 build qt5.9.9 development environment
Unity technical manual - lifecycle rotation rotationoverlifetime speed rotation rotationbyspeed external forces
Vscode / * * generate function comments
Hover effect of eight buttons
There is a repeating element iii[pruning with ordered ordering]
The performance of the server's four channel memory is improved. How about the performance of the four channel memory
User scheduling problem
十大券商的排名是?手机开户安全么?
new TypeReference用法 fastjson[通俗易懂]
Are the top ten leading securities companies safe to open accounts
Is it convenient to open a stock account? Is online account opening safe?
实际开户复杂吗?在线开户安全么?
What is an operator?
Qt产生指定范围内随机数(随机字符串)
Qinheng ch583 USB custom hid debugging record
VSCode /**生成函数注释
HMS Core机器学习服务实现同声传译,支持中英文互译和多种音色语音播报
揭秘GES超大规模图计算引擎HyG:图切分
How to open a stock account is it safe to open an account