Cryptography Literacy: Encryption, authentication, public key, private key

Source: Internet
Author: User
Tags asymmetric encryption

Recently, in the process of contact with Hadoop, the public key and the private key is not clear, write a blog to learn.
Encryption and authentication
encryption is the encryption of data, so that illegal users, even if the encrypted data can not obtain the correct information content, so data encryption to protect data, prevent monitoring attacks. The focus is on the security of the data.
Identity Authentication is used to determine the authenticity of an identity, after confirming the identity, the system can be based on different identities to give different permissions. Its focus is on the authenticity of the user. The focus of the two is different.
Public and private keys
The public and private keys are commonly known as asymmetric encryption, which is improved from the previous symmetric encryption (using user name and password).
The public key is for others.
The private key is for your own use.
Interaction: The function of public key and private key is: the content encrypted with public key can only be decrypted with the private key, and the content encrypted with the private key can only be decrypted with the public key.

Instance:

    For example, I want to send you an encrypted message. First, I have to have your public key, and you have to have my public key.
first of all, I use your public key to encrypt this message, so that the message is not seen by others, and ensure that the message is not modified during the transfer, to ensure that the message is sent by me. After you receive the email, you can decrypt it with your private key and you can see the content.
second, I use my private key to encrypt this message, sent to your hand, you can use my public key decryption. Because the private key is only in my hand, this ensures that this email is sent to me.
when a->b data, a will use B's public key encryption, so as to ensure that only B can unlock, otherwise the general public can unlock the encrypted message, is to the confidentiality of information.


Cryptography Literacy: Encryption, authentication, public key, private key

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.