What is the role of public, private, and digital signatures
2 thoughts on “What is the role of public, private, and digital signatures”
Leave a Comment
You must be logged in to post a comment.
What is the role of public, private, and digital signatures
You must be logged in to post a comment.
1. Public key encryption
Axites, I found two string numbers, one string is 1*, and the other is 2*. I like 2*this string of numbers, so I keep it, and I do n’t tell you (private key), and then I tell you that 1*is my public key.
I have a file that cannot be seen by others, so I use 1*encryption. Others found this file, but he didn't know that 2*was the private key of decryption, so he couldn't solve it. Only I could use
string 2*, which was my private key to decrypt. This way I can protect the data.
This friends X encrypted character A with my public key 1*, and after encrypted, it became B and placed on the Internet. Others stole this document, but others couldn't solve it, because others didn't know 2*were my private keys,
can only be decrypted by me and get A after decryption. In this way, we can transmit encrypted data.
. Private key signature
If I can encrypt a piece of data with a private key (of course, only I can use a private key to encrypt, because only I know 2*is my private key). Everyone sees my content, because they all know
The public key is 1*, so what is the use of this encryption?
but my good friend X said someone posted me to send me a letter. How to do it? The content I want to send is C. Use my private key 2*, encrypted, and the contents of the encryption are D, send it to x, and then tell him
to decrypt it. He decrypted with my public key 1*and found that it was C.
In at this time, he would think that the data that could be decrypted by my public key must be added with my private key. Only I know that I have a private key, so he can confirm that it is indeed what I posted.
Is we can confirm the identity of the sender. This process is called digital signature. Of course, the specific process is slightly more complicated. Use the private key to encrypt the data, and the purpose is the digital signature.
Summary: The public key and the private key are paired, and they decrypt each other.
The public key encryption, private key decryption.
private key digital signature, public key verification.
The public key and private key are commonly known as asymmetric encryption methods, which are improved from previous symmetrical encryption (using user name and password).
Is after the server encrypts the webpage of its own private key, and send it to the client together with its own digital certificate. The "certificate manager" in the client browser has a list of trusted certificates (CA) lists, customers The end will find the CA spoil based on this list (the public spoon of the CA here may also be replaced, and the system security has fallen at this time ...). After finding the public spoon, the information of the digital certificate is interpreted. If the website interpreted information records and the website of the browse are inconsistent, it means that the browse website uses someone else's certificate, and the browser will warn. It is also possible that the public spoon cannot be found in the trust list, indicating that the certificate is issued by other CAs, and the browser will issue another warning.