Overview: 1. Generate a server key file 2. Generate a server key file based on the key file. csr file 3. Submit. csr to CA4, CA according. csr creation. crt Certificate file (server certificate issued after CA authentication) and. ca file (the
1. Introduction to encryption and decryption
1. Information security standards
NIST (National Institute of Standards and Technology) National Institute of Standards and Technology, developed three elements of network information security and
SSL security technology can be used in most Web sites, which are primarily used to handle important security data. SSL establishes a secure encrypted connection between the server and the client, most commonly the connection between the Web server
First step: Generate private key, CSR and other filesWe may need to enter the following information (interactive):---country name (2 letter code) [Au]:usstate or province name ("full name") [some-state]:new yorklocality name (eg, city) [] :
Encryption and decryption technology: symmetric encryption and decryption Parties use the same key, encryption and decryption speed is very fast, the data is first divided into data blocks in plaintext, generally the same size, if the remaining data
Data Encryption Method:1. symmetric encryptionHigh encryption efficiencyDES3DES:AES: supports encryption of 128 192 256 512 with different lengthsBlowfishToolsOpenssl encGpg 2. public key encryption (asymmetric encryption)The algorithm is complex
Introduction (Creating a generated certificate can only be used for test use.) If you want to use a self-signed certificate, you can only issue certificates to the CA authority for two-way authentication to use.The use of HTTP (Hypertext Transfer)
Overview : Two computers when communicating on the Internet, the information sent between them without special processing, that is, the encryption mechanism, it is easy to be obtained by other people, if it is ordinary information, it does not
Http://www.javacodegeeks.com/2014/07/java-keystore-tutorial.htmlTable of Contents
1. Introduction
2. SSL and how it works
3. Private Keys
4. Public certificates
5. Root Certificates
Tip: It is recommended that you do not use Google Chrome (the site's certificate is not recognized ...), you can see my google replaced by IE (not installed Firefox) ... This application is recommended to use FirefoxThe following describes the next
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.