当前位置:网站首页>Analysis of CA certificate with high value
Analysis of CA certificate with high value
2022-06-12 17:01:00 【The king of early rising】
Catalog
CA Certificate in HTTPS How is it applied in
CA Certificate in HTTPS The role of
What is? CA certificate
CA certificate , Is the core of the public key infrastructure , yes CA Identification certificate issued by the institution . If the web page does not apply CA certificate , When you visit, you will be prompted that there is no certificate .
CA Certificate establishment
First, the server will generate its own public and private keys , Server application CA certificate , You need to give the public key to CA Institutions .
The next step is to create... For this server CA certificate .CA The certificate structure is as follows : Content and signature part I : The public key of the server , Server name 、 Name of authorization center 、 The period of validity 、 Serial number, etc : digital signature .
The first part is compressed with hash encryption algorithm , This is irreversible , The original data cannot be obtained from the compressed data .
CA The organization assigns a set of... To the server CA The public and private keys of . Of course “ Distribute ” Private key to the server , Not to the server , Only for encryption .CA The organization uses the private key to encrypt the compressed content , Get a digital signature .
CA The certificate is sent to the server .
CA Root certificate CA The root public key is built into the browser ,CA The root certificate is built into the client's operating system .
CA Certificate in HTTPS How is it applied in
now https Request flow : First, three handshakes are established TCP Connect .
TCP Three handshakes , Establishing a connection .
The server sends the certificate to the client .
Client receives Certificate , Put the... On the certificate CA Root certificate and operating system built-in CA Root certificate matches .
If the match fails , The certificate is illegal . The match is successful , Continued to .
The client gets a piece of data by hashing the contents of the certificate .
The client uses the browser built-in CA Public key decryption digital signature , Get a piece of data .
Comparison of two sections of data , If the same , It means no problem .
If different , The certificate may have been modified or not used CA Public key encryption .
Actions after matching certificates , It's protection CA Of the certificate itself .
The client generates a random symmetric key , Use the public key of the server ( Get by certificate ) Encrypt this key , Send it to the server .
Then, the symmetric key generated by the client is used http signal communication .
CA Certificate in HTTPS The role of
stay https in CA The role of the certificate is to judge whether the website is legal , By the way, bring the public key of the server to the client .
Be careful :
CA The certificate confirms whether the website is legal .
HTTPS The data encryption of is the random key generated by the client and the public key of the server 、 Private key completed .
Keep early hours , A thousand li a day
边栏推荐
- Where is it safer to open an account for thermal coal futures? How much is the thermal coal futures deposit?
- [MySQL] internal connection, external connection and self connection (detailed explanation)
- Idea displays services on the console to uniformly manage all jetty services,
- JVM memory model and local memory
- Structural requirement analysis of software engineering student information management system
- 卖疯了的临期产品:超低价、大混战与新希望
- Unit sshd.service could not be found
- Su directly switches to super administrator mode, so that many error reports can be avoided
- Microsoft Office MSDT代码执行漏洞(CVE-2022-30190)漏洞复现
- 2080 virtual machine login command
猜你喜欢

redis. clients. jedis. exceptions. JedisConnectionException: Could not get a resource from the pool

Installation and use of rolabelimg

Qcustomplot notes (I): qcustomplot adding data and curves

key为断言的map是怎么玩的

ISCC-2022 部分wp
![[MySQL] internal connection, external connection and self connection (detailed explanation)](/img/3f/9b88c2f27455f2ddd73808fbb44f8e.jpg)
[MySQL] internal connection, external connection and self connection (detailed explanation)

selenium元素定位

博士申請 | 新加坡國立大學Xinchao Wang老師招收圖神經網絡方向博士/博後

JVM memory model and local memory

记录使用yolov5进行旋转目标的检测
随机推荐
博士申请 | 新加坡国立大学Xinchao Wang老师招收图神经网络方向博士/博后
Some minor problems and solutions encountered when using ubantu
1723. 完成所有工作的最短时间
Recommend AI intelligent drawing repair software
大端模式和小端模式的区别
Double write consistency problem
[adult Liu Er - pytorch deep learning practice] notes with learning (I)
uabntu的sudo
Qcustomplot notes (I): qcustomplot adding data and curves
Microsoft Office MSDT代码执行漏洞(CVE-2022-30190)漏洞复现
Play kubernetes every 5 minutes summary
布局管理中的sizePolicy的策略问题
mysql语句
CVPR 2022 | meta learning performance in image regression task
Leetcode 2194. Excel 錶中某個範圍內的單元格(可以,已解决)
Is the securities account opened by qiniu safe? Is it legal?
Microsoft Office MSDT Code Execution Vulnerability (cve-2022-30190) vulnerability recurrence
890. 查找和替换模式 / 剑指 Offer II 080. 含有 k 个元素的组合
有趣的 LD_PRELOAD
Différence entre le mode grand et le mode petit