티스토리 뷰
PKI Introduction
Basic Terminology
Cryptography has been used for thousands of years to safeguard military and diplomatic communications. The cryptographer seeks methods to ensure the safety and security of conversations, and transactions.
By means of an encryption algorithm and a secret key, a plaintext can be converted into a not understandable ciphertext.
Basic Terminology
Symmetrical Cryptography
Two systems of cryptography exist today : symmetrical cryptography and public key cryptography (PKI).
In symmetrical key, the encryption key and the decryption key are the same.
Symmetrical Key Cryptograpy
PKI: Public Key Infrastructure
In PKI, the encryption key and the decryption key are different and cannot be deduced from eachother.
One key is a persons private key, and is not shared. The other key is a persons public key, and is made public.
Thus, one can encrypt a message with the public key of the receiver, so that nobody else may read it.
Public Key Cryptography
Message Digests
A fingerprint or message digest of a message or file, can be made, by means of a hash function. Hash functions are public, standardised functions. A small modification in a message, leads to a completely different message digest.
Message Digest
Digest sizes: 128 .. 256 bits | |
10E77 message digests | |
Single bit change | |
50% of bits change in message digest |
Digital Signature
A document can be digitally signed by encrypting the hash value of this document with a private key. The public can indeed verify that the sender has signed the document.
Digital Signature with PKI
Combination of Signature and Encryption
A document can be both digitally signed and encrypted.
Combination: Digital Signature + Encryption
Digital Certificates
A digital certificate establishes a link between a person and a public key. They are assigned by certification authorities who verify a persons identity.
Digital Certificate
'보안 > 일반' 카테고리의 다른 글
Web of trust From Wikipedia (0) | 2007.07.06 |
---|---|
[ASN.1 연재 1] ASN.1 이란? (0) | 2007.07.06 |
Composite Key Management for Ad Hoc Networks (0) | 2007.07.06 |
[본문스크랩] WSN - Sybil Attack (0) | 2007.07.06 |
[Note] Diffie-Hellman Key Exchange (0) | 2007.07.06 |
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- PIR
- 주택구매력지수
- hai
- 신한저축은행
- systemd
- 레고랜드
- ChatGPT
- SBI저축은행
- 전세매매지수
- 미국주식
- ubuntu
- logrotate
- 매매가격지수
- ROA
- 사회간접자본
- 자동트래이딩
- O365
- 실시간트래이딩
- 시스템트래이딩
- 공공인프라
- CriticalSection
- Pivot
- 다올저축은행
- 주식
- 주식트래이딩
- 군함도
- ElasticSearch
- INVOICE
- 맥쿼리인프라
- 피봇
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |