Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

A summary of digital signatures, digital certificates, digital envelopes

2025-01-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Digital envelopes: the function of digital envelopes is similar to that of ordinary envelopes. Digital envelopes use cryptographic technology to ensure that only designated recipients can read the contents of the information. Symmetric cryptographic algorithm and asymmetric cryptographic algorithm are used in digital envelopes. The sender first uses the randomly generated or pre-configured symmetric cipher information, and then uses the receiver's public key to encrypt the symmetric cipher. The symmetric cipher encrypted by the public key is called a digital envelope. When the information receiver wants to decrypt the information, it must first decrypt the digital envelope with its own private key to get the symmetric password, and then use the symmetric password to decrypt the information, which ensures the authenticity and non-snooping of data transmission. Digital signature: the function of digital signature is: non-repudiation. That is, the content signed with your own private key can only be opened with your own private key. Description: 1. Integrity has not been tampered with, 2. Source authentication, who sent 3. Non-repudiation, because it is opened with your public key, so it is sent by you. The plaintext information is run to HASH to generate a hash value, and the hash value encrypted with the initiator's private key is a digital signature. Digital certificate is referred to as certificate, which is the electronic data issued by certification authority and the basis of PKI technology. Digital certificate is the entity on the network, proving the identity of an entity and the legitimacy of the public key and the matching relationship between the entity and the public key. The certificate is the carrier of the public key, and the public key on the certificate is bound to the unique entity identity. The certificate format and certificate content follow the X.509 standard, and the main contents include: serial number, user public key, user entity information, information of × × institution, signature of visa authority, certificate validity period, etc. In a word, the digital signature is used to identify the sender of the data, and the signature means that the data is sent. Why? Because you can use your public key to open your signature information and get the hash value of plaintext. A digital envelope, a symmetric password encrypted by a public key, is called a digital envelope, which is used for the exchange of symmetric keys. A digital certificate used to prove the identity of the sender of the data. Why can you prove it? Because everyone has to trust the trusted CA, the certificate is issued by the trusted CA.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report