RSA asymmetric encryption and public key private key

Source: Internet
Author: User
Tags decrypt asymmetric encryption

Theoretically, as long as there are cryptographic rules can be decrypted, but if the decryption takes too long, such as 1000 after decryption has no meaning, this algorithm can be considered to be unable to be cracked, which means this encryption is trusted

MD5 is a one-way operation after encryption cannot be restored only for informational verification (the same input MD5 characters are the same <_>)

RSA private key Public key cryptography is a kind of algorithm that can restore the data prototype. Public key cryptography can only be solved with the private key, even if the public key itself is not able to solve the same secret key encryption is only the public key can be decrypted itself also cannot be solved. So the two are reciprocal interdependent. But join us to publish one of them (known as the public Key), and the other prudent to keep it private (known as the secret), then if the public key is encrypted with the public key information sent to us, then we can use our private key to read, even if someone in the middle of the message is intercepted, he also obtained our public key, Nor is it possible to know the message sent to US-this is the essence of public key cryptography.

The HTTPS protocol is the use of this point, access to a website with HTTPS will first obtain a public key of this website, and then use this public key to communicate with the website even if the public key is stolen when the public key is stealing the information you send to the server will not be learned, but the information sent to you by the server can be known to the public key.  The security certificate should be able to ensure that the server sends the information only you can decrypt, that only you save the private key you tell the server your public key so that the server sends you the information will not be learned, so the download security certificate should be the server generated a public key private key to you The server retains the public key used to decrypt your information. So the security certificate plus HTTPS Web page and you communicate with at least two to the public key is running.

Cognitive Limited has the wrong place after understanding again make revision <_>

RSA asymmetric encryption and public key private key

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.