Digi. Certificates: Key pairs usages

In short, we have some sort of algorithms to gen pair of private and public keys. The public key is stored in a certificate and the private key is usually kept by server(usually the CA wont keep the private key). The certificate is generated by C.A. (certificate authority) from given info and public key provided by people/company. When some person need to send message secretly, they use the given certificate‘s public key to encrypt the message before send, only servers keep the right private key can decrypt it. But how do we know if the certificate is officially generated by the correct site? 2 ways, one way is to put the certificate under the implicit trust certificate list(it is pre-installed with OS/browser). The second is to prove it is trusted by the list of certificate sites mentioned. It‘s going to ask the trusted listed authorities the correct certificate of the given site, and the authority will respond a cypher text of the requested certificate as a signature of the requested certificate, this cypher text is encrypted with its private key. Anyone hold the CA‘s certificate can decrypt it and check the expected value of the certificate is correct. Then we get a correct certificate of the site from our trusted CA.

Root CA‘s private keys are usually kept physically isolated.

Each private key needs to be backupped and kept isolated from peering. Private keys shall be parted and distributed to several systems.

[quote]

Public key are used to encrypt message, and private key are used to decrypt message.

If the whole session need to be encrypted, two pair of keys is needed.

Usually client side of pair of keys are generated randomly and not be verified through trusted list of CA.

Also, if no need high encryption, client side send a symmetric code to server through key pairs, then both sides communicate with the symmetric code rather than the public/private key method.

时间: 2024-08-07 08:29:40

Digi. Certificates: Key pairs usages的相关文章

Windows命令行查看文件的MD5.md

# 使用Windows命令certutil查看文件的MD5值 使用方法: CertUtil [Options] -hashfile InFile [HashAlgorithm] Generate and display cryptographic hash over a file 选项: * -Unicode -- Write redirected output in Unicode * -gmt -- Display times as GMT * -seconds -- Display tim

Java Developer's Guide to SSL Certificates

https://www.codebyamir.com/blog/java-developers-guide-to-ssl-certificates Overview When developing web applications, we often need to integrate with other applications using SSL.   This could be over different protocols such as HTTPS, IMAPS, or LDAPS

SSH key introduction

Preface At the first time, we take the connection with GitLab remote server. You need to type username and password as your individual credentials to login the server, since the connection between the client(your computer) and remote server(Git sever

How to generate an SSH key pair in Windows using PuTTY?

You can generate an SSH key on Windows using the PuTTY SSH client. You can download PuTTY for free from this URL. To generate a key with PuTTY, you should: Download and start the puttygen.exe generator. In the "Parameters" section choose SSH2 DS

openstack-nova

Nova-Master openstack-nova-api openstack-nova-cells openstack-nova-cert openstack-nova-conductor openstack-nova-console openstack-nova-network openstack-nova-novncproxy openstack-nova-objectstore openstack-nova-scheduler Nova-compute openstack-nova-c

Cryptographic method and system

The present invention relates to the field of security of electronic data and/or communications. In one form, the invention relates to data security and/or privacy in a distributed and/or decentralised network environment. In another form, the invent

阿里云搭建VPN

目标: 主机A有外网权限.内网权限: 主机B只有内网权限. 希望在主机A上能搭VPN,作为跳板机器,在本地主机能够直接访问主机B. 尝试1: 在主机A上搭pptpd. 尝试了两天,搜索无数,无论如何访问不了主机B.怀疑阿里云做了限制,检查Mac和IP是否相符 尝试2: 在主机B上搭建OpenVPN.搞定! 参见:http://docs.linuxtone.org/ebooks/VPN/openvpn%E9%9B%86%E5%90%88.pdf 写的相当详细 在Mac上配客户端的过程: 1.安装T

Android 5.x OTA Update官方文档(十、版本签名)

在Android中,一般来说有两个地方使用加密签名. 1.每个.apk文件必须进行签名.Android的程序包管理器通过两种方式使用签名: 当一个应用程序被替换时,只有相同签名的应用才能操作旧版本的数据. 两个应用如果签名一致,那么这两个应用可以共享User ID和用户数据. 2.OTA更新包必须进行签名否则更新程序无法进行安装.(注!我们制作更新包的时候如果不指定key,系统会指定默认的key进行签名,如testkey.) 证书和秘钥 每个秘钥需要两个文件:扩展名为.x509.pem的证书(公

How to create a jumper box in AWS VPC

本来是写的Word文档,给其他国家的同时看的,所以一开始就是英文写的,也没打算翻译成为中文了,顺便抱怨下,网上资料找了很久的资料都没有看到介绍怎么在单机环境下搭建RD Gateway的,写本文的目的是给公司的同事介绍下怎么搭建一台跳转机来做远程登录,同时希望可以帮到有需要的人. 在AWS的VPC中,我们是把所有的服务器都独立于外部的,不允许外部直接进行访问,所以如果要远程登录到VPC里面的服务器,是需要通过一台跳转服务器来进行远程登录的.这里在Windows的环境下是通过RD Gateway o