What is IBC?

Source: Internet
Author: User

Identity-based cryptograph (IBC) is an identity-based cryptographic technology developed based on the Traditional PKI (Public Key Infrastructure, it mainly reduces the complexity of deploying and using specific security applications and avoids the exchange of a large number of digital certificates generated by security applications.

Both IBC and RSA are asymmetric encryption algorithms. The differences between IBC and RSA are as follows:

1. Public Key source

The RSA public key is a string of numbers generated by random calculation. It must pass the certificate before it can be associated with the user's identity,
Certificate Management requires a complex infrastructure (Public Key Infrastructure: PKI)

The IBC public key can be any character data, which can be easily directly associated with the user's identity or role without passing through certificate exchange and building related expensive infrastructure.

2. Example

RSA public key
30 81 89 02 81 81 00 C6 61 22 C4 09 8A F5 9B Fe C3 16 99
1e 48 FD 69 dd C9 C6 EF 4D E9 fa 49 41 D9 8C 50 DF dd 26
3A 45 ce 57 5C 2C 35 B0 12 77 6B EA 1D A1 cb21 B9 69
D8 74 EE C2 F7 48 F3 2f 45 5f EA 68 B0 C4 E2 7d 95 D0 DC
D5 00 F3 36 de 45 A0 D1 9e 4A 44 47 01 D1 13 C3 59 4C 09
A4 4C 7E 9B 50 31 5f 28 56 6D BD 4B 8d 5f 57 65 C8 be 86
17 3C 58 96 90 B8 1f F3 29 B0 dd 5A 00 CF 15 A9 84 33 24
60 87 02 03 01 00 01
IBC Public Key
Jiadelin@htjs.net or your arbitrary string.

3 IBC Technology Innovation

  • NoThe digital certificates in the PKI system do not require the CA center of the Certificate Authority, and do not require the issuance and query of certificates,

    Easy to use and easy to deploy, especially for security systems of massive users

  • NoCertificates verification and other computing processes in PKI have a low computing cost and are suitable for mobile terminals.
  • NoOnline connection to the CA Server of PKI to query and verify the certificate status, with a low communication cost
    Rich policy control mechanisms that combine identity authentication and access control into one

Procedure:

 

 

N

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.