Experiences in RSA Encryption

Source: Internet
Author: User
Tags asymmetric encryption

The network is inherently insecure, and even identifying two requests from the same customer is not easy. Just like the following little guys, which one do you think would happen yesterday?

Maybe they can buy diapers of different colors? But the two children below are not so easy to deal:

What if this is the case?

Who is it? Maybe you can remove one of the baby's hats? Or bring a red card to the girl on the left? Can I write an article on sunglasses? One common defect of these methods is that they are "reversible". After a baby's hat is removed, you can wear it again. If a card is issued, the sunglasses can be switched back to the original one.

I think RSA encryption is always on fire!
Http://baike.baidu.com/view/10613.htm? FromId = 7520
 

Three people who invented the RSA Algorithm

The RSA encryption algorithm was developed by Ron Rivest, Adi Shamirh, and LenAdleman in 1977. It was named by developers. It can resist all known password attacks so far and is recommended as the Public Key Data Encryption Standard by ISO. The RSA algorithm is based on a very simple number theory fact: it is very easy to multiply two large prime numbers, but at that time it is extremely difficult to break down the product, so the product can be published as an encryption key.

With the advent of the big data era, information security has become more important than ever before. Asymmetric encryption algorithms like RSA are the foundation of security. If the day when the RSA is not secure, it will have to be streaking. Fortunately, there is no shortage of RSA in the world of mathematics. Moreover, RSA has been tested for more than 30 years, isn't it? Below is a piece of ciphertext generated using a javascript program. Because the original text is long, it is divided into six groups.

 
  1. Bytes
  2. Bytes
  3. Bytes
  4. Bytes
  5. Bytes
  6. Bytes

The RSA algorithm requires a large amount of computing and consumes resources. It is generally used in combination with symmetric algorithms. Otherwise, the server will be overwhelmed and the customer experience will not be good. RSA is usually used to transmit keys, and symmetric algorithms are used to encrypt plain text and passwords. If this is not reassuring, you can use offline channels to transmit dynamic keys and use RSA on the basis of dynamic key superposition. For example, the Bank's U shield is probably used to store dynamic keys. In the process of implementing frontend and backend collaboration, the most disturbing thing is the coding problem. For example, the "+" symbol is not simple. The "+" symbol is actually a space.

Theoretically, based on the inherent weakness of the network, no matter what method is used, the security problem of "online period" cannot be completely solved. Even a dynamic password is still static information during a transaction. If you can intercept communication between the client and the server during the user's online period, you can simulate the same client. This will return to the question at the beginning of the article:Which one did you think would happen yesterday?If I want to say this, I have to ask their mom and dad to take them all away. Welcome to come back next time ~~~~

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.