In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
RSA algorithm is the earliest widely used asymmetric encryption algorithm. RSA algorithm is based on the difficulty of decomposing the product of large primes. The relatively new asymmetric encryption algorithm is ECC,ECC based on the discrete logarithm problem. It can achieve the same security as RSA with less computing resources consumption. At present, most digital certificates are still based on RSA algorithm. If a fast method of calculating prime product or discrete logarithm is found mathematically, it means that the corresponding asymmetric encryption algorithm is completely cracked. Before the emergence of such a mathematical genius, we could use these algorithms without worry.
The symmetric encryption algorithm itself has no constraint on the value of the key, although we deliberately avoid some key values that are too regular. Unlike symmetric keys, asymmetric encryption algorithms cannot use arbitrary bit strings as keys. The key used in asymmetric encryption is a particularly large number that meets the requirements of the algorithm. For example, the key of the RSA algorithm comes from two large primes. The asymmetric private key has no key exchange and distribution, and the asymmetric private key should only be generated in a secure and controllable environment of the expected private key holder. Asymmetric private keys are easier to control because they do not need to be shared with anyone else. In this way, we can establish a secure asymmetric encryption system in which only the owner of the private key can decrypt and sign the expected content.
Software or hardware modules that implement asymmetric encryption generally have the ability to generate and protect private keys. In the case of encryption security hardware such as USBkey and smart cards, the generation and protection of private keys will be in these hardware. When the private key is bound to the security hardware, it is easy for the user to understand and implement the management requirements for these physical security certificates with the private key. In the absence of external security hardware, the encryption package uses the resources of the local computing platform to generate key pairs and protect private keys. Storing the private key in this file form will be threatened by malicious code on the computer, and its security requirements for users are relatively high.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.