티스토리 뷰
PKI Introduction
Basic Terminology
Cryptography has been used for thousands of years to safeguard military and diplomatic communications. The cryptographer seeks methods to ensure the safety and security of conversations, and transactions.
By means of an encryption algorithm and a secret key, a plaintext can be converted into a not understandable ciphertext.
Basic Terminology
Symmetrical Cryptography
Two systems of cryptography exist today : symmetrical cryptography and public key cryptography (PKI).
In symmetrical key, the encryption key and the decryption key are the same.
Symmetrical Key Cryptograpy
PKI: Public Key Infrastructure
In PKI, the encryption key and the decryption key are different and cannot be deduced from eachother.
One key is a persons private key, and is not shared. The other key is a persons public key, and is made public.
Thus, one can encrypt a message with the public key of the receiver, so that nobody else may read it.
Public Key Cryptography
Message Digests
A fingerprint or message digest of a message or file, can be made, by means of a hash function. Hash functions are public, standardised functions. A small modification in a message, leads to a completely different message digest.
Message Digest
Digest sizes: 128 .. 256 bits | |
10E77 message digests | |
Single bit change | |
50% of bits change in message digest |
Digital Signature
A document can be digitally signed by encrypting the hash value of this document with a private key. The public can indeed verify that the sender has signed the document.
Digital Signature with PKI
Combination of Signature and Encryption
A document can be both digitally signed and encrypted.
Combination: Digital Signature + Encryption
Digital Certificates
A digital certificate establishes a link between a person and a public key. They are assigned by certification authorities who verify a persons identity.
Digital Certificate
'보안 > 일반' 카테고리의 다른 글
Web of trust From Wikipedia (0) | 2007.07.06 |
---|---|
[ASN.1 연재 1] ASN.1 이란? (0) | 2007.07.06 |
Composite Key Management for Ad Hoc Networks (0) | 2007.07.06 |
[본문스크랩] WSN - Sybil Attack (0) | 2007.07.06 |
[Note] Diffie-Hellman Key Exchange (0) | 2007.07.06 |
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- hai
- 미국주식
- logrotate
- 사회간접자본
- PIR
- 군함도
- 시스템트래이딩
- ubuntu
- 다올저축은행
- 실시간트래이딩
- 자동트래이딩
- INVOICE
- 신한저축은행
- ElasticSearch
- ChatGPT
- O365
- Pivot
- SBI저축은행
- 공공인프라
- 매매가격지수
- 주식트래이딩
- 맥쿼리인프라
- 피봇
- CriticalSection
- ROA
- 주택구매력지수
- 레고랜드
- 전세매매지수
- systemd
- 주식
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |