- The establishment of an encrypted communication process:
- Sender:
- Extracts the signature of the data using a one-way encryption algorithm; "One-Way encryption algorithm"
One-way encryption > signature + signature
- using your own Private key encryption signature, appended to the data, "Public key cryptography (non-heap encrypted)"
public key cryptography >[signature redaction + data]
- generates a temporary key for symmetric encryption, Use this temporary key to encrypt the data and encrypt the data signature. "Symmetric encryption"
symmetric encryption >[Ciphertext [signature ciphertext + data]]
- encrypts the temporary key with the recipient's public key, appended to the data behind the symmetric encryption.
public key encryption (opponent) >[temporary key [ciphertext [signature ciphertext + data]]
- Receiver:
- decrypts the encrypted temporary key with its own private key;
packet original: [Temporary key] [ciphertext [signature ciphertext + data]]
public key cryptography >[ciphertext [signature ciphertext + data]] è temporary key
- uses temporary key to decrypt data and signature ciphertext,
- decrypts the signature cipher with the sender's public key to obtain the data's signature
public key Cryptography > signature + data
The
- uses the same one-way encryption algorithm as the other party to settle the signature of the data and compare it with the decrypted signature to verify the integrity and privacy of the data.
One-way encryption > data integrity check
In the above encrypted communication process, the entire process is secure and encrypted, only when the public key encryption, can not verify that the resulting public key is the key of the subject or other people forged key, so need to do digital authentication:
- encryption protocol and encryption algorithm:
- symmetric encryption:
- attribute:
- encrypted decryption using the same key
- separates plaintext into fixed large A small block, encrypted one after the other;
- its security relies on keys rather than algorithms (most algorithms are public)
- Common algorithms:
- Des:data Encryption Standard, 56bits
- 3DES
- aes:advanced encrpytion, (128bits,192,256,384,51 2bits)
- BlowFish
- twofish
- idea
- RC6
- cast5
- defect:
- too many keys;
- Key Distribution process potential risks.
- One-way encryption:
- Public Key cryptography:
- Features:
key in pairs appears;
② public key is extracted from the private key,
- data encrypted with public key, Only private keys that are paired with this public key can be decrypted, and vice versa
④ key lengths, such as 512bits,1024,2048,4096bits
⑤ Commonly used for data signing and key exchange
Third, the authentication mechanism:
Cryptographic decryption and OpenSSL establishing a private CA