This article is a brief introduction;
I. Data encryption methods;
2. Basic Applications of Openssl and creation of CA certificates and certification;
I. Data encryption methods;
1. symmetric encryption: the encryption and decryption Parties use the
Encryption Incode: Translation of plaintext (readable information), using different algorithms to encrypt plaintext in code form (password). The inverse process of the process is called decryption (Descode), the process of converting the encoded
1. Introduction to encryption and decryption
1. Information security standards
NIST (National Institute of Standards and Technology) National Institute of Standards and Technology, developed three elements of network information security and
Objective:In the early days of the Internet, the number of hosts connected to the Internet was small and applications were few, so the network protocols that were designed early in the morning did not take into account the concept of network
Introduction to OpenSSL Protocol
SSL (Secure Socket Layer) is a standard for Secure Web communication proposed by Netscape. In general network protocol applications, data is packaged several times from top to bottom in the machine, and then enters
The establishment of an encrypted communication process:
Sender:
Extracts the signature of the data using a one-way encryption algorithm; "One-Way encryption algorithm" One-way encryption > signature + signature
Graphic SSL and encryption and decryption
1. SSL Principle
Secure Sockets Layer (Secure Socket Layer) is located between TCP/IP and various application Layer protocols, providing security support for data communication. It is used to ensure the
"What is encrypted decryption"encryption: that is, the process of converting plaintext into redact is to use a special algorithm to change the original information data, so that unauthorized users even obtain the encrypted information, but because
Briefly:Important data in the Internet transmission must ensure the security of the data, need to do from four aspects:1. Ensure that the data is sent from a real source, not someone else (source authentication)2. ensure that data has not been
1. Introduction?? Today I would like to share with you the various encryption and decryption algorithms used in Internet communication, before we introduce the encryption and decryption knowledge, we first understand the meaning of the relevant
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.