Public key and private key principle

xiaoxiao2021-03-06  44

It has always understood the public key and private key, I feel that the ambiguity is two, and my heart is straight. How does public key do? How will the private key? What is the principle of work? I have been looking for a long time today. By looking at everyone's understanding of this key, I finally figured out, I wrote my experience to everyone to see the comrades with questions about the key. The public key and private key are commonly known as an asymmetric encryption mode, which is an increase in the previous symmetric encryption (using the username and password). I explain the principle by email. The purpose of using the public key and the private key is to implement a secure email, must be implemented as follows: 1. I will send it to you must encrypt, and I can't be seen by others during the transmission of the message. 2. It must be guaranteed to be emails I sent, not someone pretending to me. To achieve such a goal must send the two people with public key and private key. Public key, you can use it for everyone, you can release it through an email, you can let others download by the website, the public key is actually used to encrypt / use. Private key, you must save very carefully, it is best to add a password, private key is used to decrypt / sign, first of all, the private key is only personal. The role of the public key and the private key is: the content encrypted with the public key can only be decrypted with a private key, and the content encrypted with private key can only be decrypted with a public key. For example, I want to send you an encrypted email. First, I have to have your public key, you must also have my public key. First of all, I use your public key to encrypt this message, so that this message is not seen by others, and it is guaranteed that this message is not modified during the transfer. After you receive the email, you can decrypt your private key and you can see the content. Second, I use my private key to encrypt this email. After sending it to your hand, you can decrypt my public key. Because the private key is only in my hand, this is guaranteed that this email is I sent. When A-> b, a will use B's public key to encrypt, so that only B can be unspeakable, or the proliance can solve the encrypted message, that is, to the confidentiality of the information. The verification is the mechanism to use the signature. When the information is given to everyone, it will make a signature of his own private key. Thus all those who receive the message can be inferred with a public key to confirm the message. It was sent by A.

转载请注明原文地址:https://www.9cbs.com/read-52169.html

New Post(0)