当前位置:网站首页>Analysis of CA certificate with high value
Analysis of CA certificate with high value
2022-06-12 17:01:00 【The king of early rising】
Catalog
CA Certificate in HTTPS How is it applied in
CA Certificate in HTTPS The role of
What is? CA certificate
CA certificate , Is the core of the public key infrastructure , yes CA Identification certificate issued by the institution . If the web page does not apply CA certificate , When you visit, you will be prompted that there is no certificate .
CA Certificate establishment
First, the server will generate its own public and private keys , Server application CA certificate , You need to give the public key to CA Institutions .
The next step is to create... For this server CA certificate .CA The certificate structure is as follows : Content and signature part I : The public key of the server , Server name 、 Name of authorization center 、 The period of validity 、 Serial number, etc : digital signature .
The first part is compressed with hash encryption algorithm , This is irreversible , The original data cannot be obtained from the compressed data .
CA The organization assigns a set of... To the server CA The public and private keys of . Of course “ Distribute ” Private key to the server , Not to the server , Only for encryption .CA The organization uses the private key to encrypt the compressed content , Get a digital signature .
CA The certificate is sent to the server .
CA Root certificate CA The root public key is built into the browser ,CA The root certificate is built into the client's operating system .
CA Certificate in HTTPS How is it applied in
now https Request flow : First, three handshakes are established TCP Connect .
TCP Three handshakes , Establishing a connection .
The server sends the certificate to the client .
Client receives Certificate , Put the... On the certificate CA Root certificate and operating system built-in CA Root certificate matches .
If the match fails , The certificate is illegal . The match is successful , Continued to .
The client gets a piece of data by hashing the contents of the certificate .
The client uses the browser built-in CA Public key decryption digital signature , Get a piece of data .
Comparison of two sections of data , If the same , It means no problem .
If different , The certificate may have been modified or not used CA Public key encryption .
Actions after matching certificates , It's protection CA Of the certificate itself .
The client generates a random symmetric key , Use the public key of the server ( Get by certificate ) Encrypt this key , Send it to the server .
Then, the symmetric key generated by the client is used http signal communication .
CA Certificate in HTTPS The role of
stay https in CA The role of the certificate is to judge whether the website is legal , By the way, bring the public key of the server to the client .
Be careful :
CA The certificate confirms whether the website is legal .
HTTPS The data encryption of is the random key generated by the client and the public key of the server 、 Private key completed .
Keep early hours , A thousand li a day
边栏推荐
- 云开发坤坤鸡乐盒微信小程序源码
- Double write consistency problem
- 并发三色标记法
- 890. 查找和替换模式 / 剑指 Offer II 080. 含有 k 个元素的组合
- Google browser debugging skills
- Iscc-2022 part WP
- Contract awarding and AQS
- Information outline recording tool: omnioutliner 5 Pro Chinese version
- 博士申请 | 新加坡国立大学Xinchao Wang老师招收图神经网络方向博士/博后
- 从50亿图文中提取中文跨模态新基准Zero,奇虎360全新预训练框架超越多项SOTA
猜你喜欢
Programmers broke the news: 3 job hopping in 4 years, and the salary has tripled! Netizen: the fist is hard
Mongodb learning and sorting (basic command learning of users, databases, collections and documents)
Uniapp wallpaper applet source code / double ended wechat Tiktok applet source code
借助SpotBugs将程序错误扼杀在摇篮中
Installation and use of rolabelimg
JVM内存模型与本地内存
1723. 完成所有工作的最短时间
Contract awarding and AQS
Gerrit+2触发Jenkins任务
JVM memory model and local memory
随机推荐
ISCC-2022 部分wp
Crazy temporary products: super low price, big scuffle and new hope
叶子分享站PHP源码下载
Doctor application | National University of Singapore, Xinchao Wang, teacher recruitment, doctor / postdoctoral candidate in the direction of graph neural network
MySQL事务简介、事务隔离级别
redis.clients.jedis.exceptions.JedisConnectionException: Could not get a resource from the pool
写技术博客的意义
Canvas advanced functions (Part 2)
[Hunan University] information sharing of the first and second postgraduate entrance examinations
Loading shellcode in C and go languages
[raspberry pie]: (IV) camera advanced
Advanced Qt development: a preliminary study QT + OpenGL
890. find and replace mode / Sword finger offer II 080 Combination with k elements
Object. Keys traverses an object
Demande de doctorat | xinchao Wang, Université nationale de Singapour
初识GO语言
R语言使用pdf函数将可视化图像结果保存到pdf文件中、使用pdf函数打开图像设备、使用dev.off函数关闭图像设备、自定义width参数和height参数指定图像的宽度和高度
性能优化之编译优化
IDEA在控制台显示出services,统一管理所有的jetty服务,
并发三色标记法