Cryptography and Identity Authentication Technology-principles and practical applications of PKI & lt; 3 & gt;

Source: Internet
Author: User

Implement encryption protection for office build applications

Word:

A. By default, word uses the rc4 encryption algorithm.

B. Understand the risk of passwords.


1. Set the office password.

2. Crack the office password. Use Accent Office Password Recovery.


3. Process:

A. Install software

B. Start the software.

C. Open the cracked file and click Start.

D. the pop-up prompt shows whether your password has certain characters.

E. Character Set, next step

F. Note: Do you remember part of the password.

G. Select the password range.

H. Length of the password. Start to search for characters. next

I. Set the parameter display.


4. The time for cracking the file is related to the password strength.



Deploy EFS encrypted file system and restore proxy

1. Basic EFS knowledge:

· It is a hybrid encryption system used on the NTFS encryption system.

· Transparent during encryption.

· Working Process: 1.EFS driver calls "Microsoft encryption service provider MCP" to generate a "file encryption key FEK


Generally, a 128-bit key is generated. 2. EFS uses FEK to encrypt the file. Note that only the file data is encrypted, and other attributes are authorized.


Limits remain unchanged. 3. EFS stores encrypted files on NTFS. 4. the EFS calls "MCP" again to obtain the public IP address of the EFS.


Key. Note: When encrypting the file system, you can encrypt another copy of the FEK with a public key. The password can be restored. Reduced security


But the document can be restored to reduce the possibility of document loss.


2. encrypt the file system and restore the Proxy:

· 1. Create three users on the computer.

· 2. Create a document and perform encryption and NTFS partitioning.

· 3. the private key of user1 is on the certificate. MMc to export the Private Key

· 4. user2 fails to decrypt the document because there is no private key.

· 5. The private key from user2 to user1 is successfully viewed.

· Features of a hybrid file system.

3. Start the recovery proxy before encrypting the file.

-- Gpedit. msc --> Public Authorization Policy --》recovery proxy --》cmd--》cipher.exe/r: dra generates a certificate for the recovery proxy


.

-- Group Policy -- recovery agent of the encrypted file system -- add certificate -- Restore agent import computer

-- Import certificate to computer



This article is from the "Security_net" blog, please be sure to keep this http://yxh1157686920.blog.51cto.com/7743046/1299565

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.