当前位置:网站首页>Cryptography notes
Cryptography notes
2022-06-28 05:35:00 【Jane,】
Catalog
Evaluation criteria for passwords :
Symmetric cipher algorithm (Symmetric-key Algorithm)
Asymmetric cipher algorithm (Asymmetric-key Algorithm)
The principle of double key encryption is as follows :
Abstract algorithm (Digest Algorithm)
The basic definition :
Cryptography not only studies the mathematical algorithms of encryption and decryption . More time , Cryptography studies the strategy of protecting information security , We can call it “ agreement ”. Based on the existing mathematical model , We often ignore the specific mathematical implementation methods , Instead, focus on the security measures that can be built with the help of these mathematical tools .
As long as the decipherer can't afford it ( Time , Human or other resources ) Next, complete the decipherment , We can think that this password is very secure
Evaluation criteria for passwords :
1. Security : Practical safety , Randomness , reliability , Other safety factors
2. cost : Patent requirements , Computational efficiency , Storage space efficiency
3. Algorithm and execution features : flexibility , Conciseness
Text :
There are three main types of cryptographic algorithms : Symmetric cipher algorithm 、 Asymmetric cipher algorithm 、 Abstract algorithm .
Symmetric cipher algorithm (Symmetric-key Algorithm)
Symmetric algorithm It refers to the same cryptographic algorithm of encryption key and decryption key , Also known as Secret key algorithm or Single key algorithm .
The algorithm is further divided into Block cipher algorithm (Block cipher) and Stream cipher algorithm (Stream cipher) .
- Block cipher algorithm
- Also known as block encryption algorithm
- Encryption step one : Split the plaintext into N A fixed length plaintext block
- Encryption step two : Encrypt each plaintext block with the same secret key and algorithm to get N A ciphertext block of equal length
- Encryption step three : And then N Ciphertext blocks are combined in order to get ciphertext
- Stream cipher algorithm
- Also known as sequence cipher algorithm
- Only encrypt at a time \ Decrypt one bit or one byte plaintext
In the case of single key encryption , There is only one key , So the key storage becomes very important . Once the key is leaked , The password is cracked .
Asymmetric cipher algorithm (Asymmetric-key Algorithm)
Asymmetric algorithm It refers to the different cryptographic algorithms between encryption key and decryption key , Also known as Public cryptographic algorithms or Public key algorithm , The algorithm uses a secret key ( Open ) To encrypt , With another secret key ( Private ) Decrypt .
The principle of double key encryption is as follows :
a) Public key and private key are one-to-one correspondence , With a public key, there must be a corresponding 、 Unique private key , And vice versa .
b) be-all ( Public key , Private key ) Yeah, it's different .
c) Using public key can unlock the information encrypted by private key , And vice versa , namely , Public keys are used to encrypt information , The private key is used for digital signature .
d) It should be relatively easy to generate public key and private key at the same time , But extrapolate the private key from the public key , It should be difficult or impossible .
Because anyone can generate their own ( Public key , Private key ) Yes , So in order to prevent someone from spreading forged public key to cheat trust , You need a reliable third-party organization to generate certified ( Public key , Private key ) Yes . at present , The world's leading digital service certification provider is located in California, USA Verisign company , Its main business is distribution RSA digital certificate .
at present , The general single key encryption algorithm is AES, The general double key encryption algorithm is RSA, Both originated in the last century 70 years .
Abstract algorithm (Digest Algorithm)
Abstract algorithm It compresses the data into summaries , Make the data smaller , Fix the data point format ( Data of any length is hashed , Will output a fixed length of data , be called “ Hash value ”) Also known as Hash function 、 hash function 、 Hash function 、 One way function etc. .
The output data of fixed length generated by the algorithm is called The summary is worth 、 Hash value or Hash value , The algorithm has no secret key .
Abstract algorithm It is usually used to determine the integrity of data , That is, hash the data and compare it The summary is worth Is it consistent .
Algorithms are mainly divided into three categories :MD(Message Digest, Message digest algorithm )、SHA-1(Secure Hash Algorithm, Secure hash algorithm ) and MAC(Message Authentication Code, Message authentication code algorithm ); Another national security standard SM3 Also belongs to the summary algorithm .
The original text has been slightly revised , The summaries are very different .
Conclusion :
We have already explained the classic RSA Asymmetric cryptographic algorithms and SHA256 Abstract algorithm , In the future, I will publish a separate article to explain AES Symmetric cipher algorithm .
in my opinion , What's really interesting about cryptography is : We want to protect our privacy on the Internet . For one thousand years , People have been trying , Explore , But the technology of the past has not been able to achieve a high degree of privacy , Electronic technology is expected to become a reality . It eclipses all classical codes (20 In the late 20th century , Like Caesar , Virginia ,ENIGMA). But at the same time , It will also fall into the code of pen and paper and mind games , Rise to a level beyond human control by means of machines . Let all the bad guys who want to pry into people's privacy be out of reach
Put trust in the sun , Hide the secret in the consensus .
边栏推荐
- Share a powerful tool for factor Mining: genetic programming
- How does guotaijun charge for safe varieties? Let's talk about the futures account opening process
- Zzuli:1071 decomposing prime factor
- 阴阳师页面
- Yunda's cloud based business in Taiwan construction 𞓜 practical school
- Create NFS based storageclass on kubernetes
- Prove that there are infinite primes / primes
- Flink 窗口机制 (两次等待, 最后兜底)
- JS中的链表(含leetcode例题)<持续更新~>
- 双向电平转换电路
猜你喜欢
![[JVM] - memory partition in JVM](/img/d8/29a5dc0ff61e35d73f48effb858770.png)
[JVM] - memory partition in JVM
![[untitled] drv8825 stepping motor drive board schematic diagram](/img/30/02f695592f3b624ebbb2b7a9f68052.png)
[untitled] drv8825 stepping motor drive board schematic diagram

Extjs library management system source code intelligent library management system source code
![[leetcode] 12. Integer to Roman numeral](/img/3e/815f24a85a3333ce924acee1856f62.png)
[leetcode] 12. Integer to Roman numeral

Blog login box

Oracle 常用基础函数

Amino dye research: lumiprobe fam amine, 6-isomer

Gorm transaction experience

线条动画

Interpretation of cloud native microservice technology trend
随机推荐
【JVM】——JVM中內存劃分
Leecode question brushing-ii
Liuhaiping's mobile phone passes [[uiapplication sharedapplication] delegate] window. safeAreaInsets. The height of the bottom security zone is 0
MySQL 45 talk | 05 explain the index in simple terms (Part 2)
How long will the PMP test results come out? You must know this!
Camera Basics
Prove that there are infinite primes / primes
Reactive dye research: lumiprobe af594 NHS ester, 5-isomer
codeforces每日5题(均1700)
数据中台:AI中台的实施与总结
Application of Beidou No.3 short message terminal in dam safety monitoring scheme
Typescript interface
When excel copies the contents of a row, the columns are separated by the tab "\t"
[JVM] - memory partition in JVM
猿粉猿动力-开发者活动袭!
独立站卖家都在用的五大电子邮件营销技巧,你知道吗?
Create NFS based storageclass on kubernetes
关系数据库与文档数据库对比
? How to write the position to output true
Question bank and answers of 2022 materialman general basic (materialman) operation certificate examination