Public key algorithm

2010-08-15  来源:本站原创  分类:Java  人气:191 E5% 85% AC% E9% 92% A5% E7% AE% 97% E6% B3% 95

Abstract correcting edit summary

Fast public-key algorithm and the traditional public-key algorithms have wider application than the prospects of a fast public key system is currently a hot topic of public-key system.


  • 1 Definition
  • 2 History
  • 3 Encryption Standard
  • 4 Work
  • 5 uses
  • 6 defects

Public key algorithm - Definition

Public key algorithm public key algorithm

Asymmetric encryption algorithm using two different but is perfectly matched pair of keys - a public key and private key. Asymmetric encryption algorithm using the encrypted files, only use a pair of matching public key and private key in order to complete the plaintext of the encryption and decryption process. Plaintext public key encryption used to encrypt, decrypt ciphertext using the private key to complete, and the sender (encryptor) that received one side of the public key , only received one side (decryptor) is the only know the private key people. The basic principle of asymmetric encryption algorithm, if the sender want to send only received one side can interpret the encrypted information is sent by the private key encryption to use their own letters, the recipient's public key to decrypt using the letter the letter. Clearly, using an asymmetric encryption algorithm, the two sides in the communication transceiver before the party must be prepared to receive their long randomly generated public key sent to the sender, while his private key retained. As asymmetric algorithms have two keys, thus suitable for a distributed system of data encryption. Widely used asymmetric encryption algorithm RSA algorithm and a National Bureau of Standards proposed by the U.S. DSA . To an asymmetric encryption algorithm based encryption technology is widely used.

Public key algorithm - History

Cryptography has a long history. Ancient people did not under high-speed computing equipment, tried a variety of ways, but also contains many clever ideas. As early as 1900 BC, a member of ancient Egyptian writing an inscription on the use of a non-standard hieroglyphs, this is the first recorded human cryptography. Later, the ancient people like to use cryptography reverse the order of the alphabet, to the letter instead, or use the wrong position after a certain number of letters in front of the letter substitution. Some idea of cryptography is also very clever.

Modern cryptography epoch-making breakthrough, Witter Field; Diffie (Whitfield Diffie) and Martin; Hellman (Martin Hellman) the concept of public key encryption system, which is published in 1976. But Witt Field; Diffie and Martin; Hellman knapsack algorithm provide the MH was deciphered in 1984, which lost its practical significance. Truly viable algorithm for public key encryption system is a Long; Rivest (Ronald L. Rivest), Adi; Shamir (Adi Shamir) and Leonard; Adelman (Leonard M. Adlemen) in Witt Field • Diffie and Martin; Hellman's paper inspired the invention in 1977, which is still in use in the RSA algorithm. It was the first not only for data encryption can be used for digital signature algorithms.

Public key algorithm - Encryption Standard

Public key cryptography standards (PKCS) is RSA Laboratories, and various security systems developer for the global cooperation to develop standards. PKCS standards have been widely accepted, and the standard PKCS series have become standard in many part of the formal and practical, including ANSI X9, PKIX, SET, S / MIME.

Public key algorithm - works

In 1976, Whitfield Diffe and Martin Hellman to create a public key encryption. Public key encryption is a major innovation because it fundamentally changed the encryption and decryption process.

Diffe and Hellman proposed the use of two keys, instead of using a shared key. A key (called "private key") is confidential. It can only be saved by one party, but not all sharing. The second key (called "public key") is not confidential, and can be widely shared. The two keys (called "key pair") in the encryption and decryption operations with the use. Key relationships with special complementary, so that each key can only be with the key pair used in conjunction with another key. This relationship will be key in the key on the only linked to each other: the public key and its corresponding private key pair, and are not associated with any other key.

As the public key and private key algorithms the mathematical relationship between the specific, making this match possible. Key mathematically related to each other in, for example, can be achieved with the use of two keys on the effect of using the symmetric key. Key must be used with: can not use each individual key to undo its own operation. This means that each individual key operations are one-way operation: You can not use a key to undo its action. In addition, the design of algorithms used in the two keys, specially designed not to use a key to determine the key on to another key. Therefore, the private key can not be determined under the public key. However, making possible the key to the mathematical theory also makes the key on a symmetric key which does not have a shortcoming. That is, the algorithm used must be strong enough to make it impossible to try by force, using the known public key to decrypt the encrypted information through it. Public key used mathematical complexity and characteristics of its way to make up for it is well-known fact that, in order to prevent people from using it to successfully solve encoding information.

If this concept applies to the previous example, the sender will use the public key to encrypt a password in plain text. Then, the recipient will use the private key to decrypt the password back into plain text.

As the key pair in the private and public keys of the special relationship that exists between, so one can when dealing with many people using the same key pair instead of separately with each person using a different key. As long as the private key is confidential, you can freely distribute the public key, and reassured the people that use it. Many people use the same key pair representing the cryptography on a major breakthrough because it significantly reduces the demand for key management, greatly increased the availability of cryptography. Users can share any number of staff a key pair for each person instead of a separate key.

Public key encryption is e-mail security an essential element. If no public key encryption, then the existence of useful e-mail security solution is doubtful, because before the advent of public key encryption, key management is a very troublesome thing. After understanding the basic concepts of public key encryption, the next step is to understand how to implement these concepts through e-mail security. [1]

Public key algorithm - Uses

Public key system, the principle is: User A has a pair of key pairs, divided into public and private key, this key pair is unique, is through a huge number for prime factorization proceeds. When the information encrypted with the public key can only be used with its matching private key to decrypt, and vice versa, the private key encrypted message can only be decrypted with the public key. This, A generates the key pair from the certification system, after its private key to save the good, the public key open out, when a user B with A communications, wants to ensure data security, you can use A's public key encrypted information, then pass ciphertext A, so the world is in the hands of the private key that only A can decrypt this ciphertext, thus ensuring information security.

In fact, the information encrypted public key system is one of the purposes, it has a purpose that is the signature of information, anti-denial of this information dissemination, and modification by third parties. Why is this mechanism can achieve this in this function? Very simple, or use the "public key encryption, private key can only solution; private key encryption, public key can only solution," the truth. For example: User A with his own private key to sign messages sent to the (encryption), and then sent out, and later he found his information publicly against him, he will not recognize the information that he made, but he did not may be denied because the information has his private key signature, then the information using his public key authentication, we know that this information is definitely A hair, because only A uses private key signature information received, to use The public key solution. If A is also recognized that he made the message that there is only one possible, it is his private key had been stolen.

Now we know the principle of public-key mechanism, and that it what is the use? On the example above more commonly used, and in our daily work, while others use the public key mechanism, and we may have been used key disk , it U disk is a similar thing, generally provide USB interfaces , it uses the public key mechanism, when we initialize a computer disk, when this key, it will generate a pair of key pair, there is the public key computer, there is the key to set the private key, when the user wants to authenticate to a system though, only insert the key disk though, would the public-private key encryption and decryption of principle, to complete the user authentication process without having to enter account and password for authentication.

Public key algorithm - disadvantages

In reality, the public key system also has its drawbacks, it is a very low efficiency compared to single-key algorithm used one or two orders of magnitude slower is possible, it often is not suitable for a large number of original information is encrypted using a single password key mechanism of the original information is encrypted, then the single key, we can be encrypted by public key mechanisms.

  • Public key algorithm 2010-08-15 E5% 85% AC% E9% 92% A5% E7% AE% 97% E6% B3% 95 Abstract correcting edit summary Fast public-key algorithm and the traditional public-key algorithms have wider application than the prospects of a fast public key system is

  • RSA Public Key Cryptography in Java 2010-12-20

    Public Key Cryptography is a well-known Concept, but for some Reason the JCE (Java Cryptography Extensions) documentation doesn't make IT ALL at Clear How to interoperate with common formats such as those public Key produced by openssl . If you try t

  • Encryption, decryption, authentication, digital signature, public key private key 2010-12-20

    Encryption, decryption, authentication, digital signature, public key private key articles Category: Industry Applications Bob, Alice and digital certificates Network security is probably the most well-known figure in Bob and Alice, because a lot of

  • Public key encryption and digital signature 2011-08-02

    The 1970s, a mathematical breakthrough, shocked the world cryptographer and intelligence personnel, this is the public key encryption (PKE) technology. Traditional encryption methods, it uses two keys: a public key and a secret key used to encrypt th

  • [Transfer] automatic login with ssh public key linux server 2011-09-08

    [Transfer] As a linux administrator, log on multiple Linux servers for remote operation is part of the work day. But with the increase in the server, each landing will be prompted to enter a user name and pa

  • Public key to encrypt the file transfer process 2010-03-24

    Digital certificates in e-learning-related content, see the following paragraph statement: Microsoft's Window NT security architecture, the public key system is mainly used for private key encryption process. If you want each user to encrypt data, ne

  • Debugging SSH public key authentication problems 2010-02-28

    [Reprinted] Debugging SSH public key authentication problems In: Operating Systems 28 Feb 2007 Original Address: After a longer than desired struggle with getting

  • GPG error: The following signatures couldn't be verified because the public key 2010-04-24

    In the apt-get update this when a similar error: Wrote, W: GPG error: karmic Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY D45DF2E8FC91AE7E Solution: Wrote, sudo apt

  • Public key certificate - a public key encryption 2010-05-28

    Reprinted from: Public key certificate - a public key encryption Public key certificate, usually referred to as the certificate is a digital signature of the declaration, it will bind public key values to the

  • php class encryption and decryption (including the public key) 2010-06-08

    <? Php class Crypt ( protected $ key = ""; / / public key private function keyED ($ txt, $ encrypt_key) ( $ Encrypt_key = md5 ($ encrypt_key); $ Ctr = 0; $ Tmp = ""; for ($ i = 0; $ i <strlen ($ txt); $ i + +) ( if ($ ctr == strl

  • Public key and private key 2010-06-10

    1, public key and private key pairs 2, open the key called the public key, called private key known only to themselves 3, only data with public key encryption private key can decrypt the corresponding 4, data encrypted with the private key correspond

  • Private key encryption. Public key encryption. Digital Signature Resources 2010-06-24

    pem openssl generate a digital certificate: OpenSSL system of digital certificates to use keys: OpenSSL SSL-using Keytool and generate and issue

  • In Windows XP use OpenSSH and PuTTY's public key authentication remote management Unubtu Server 10.04 LTS - the 2010-07-07

    NOTE: The code notes that the role of # only, the content can not be entered into the command line window Remote management Ubuntu, can in many ways, here only introduced SSH. Remote login via SSH to the server, so you feel like working on the same s

  • Java generates RSA asymmetric public key and private key encryption (using the java API) 2010-07-16

    Non-symmetric encryption is ideal for multiple client and server secret communications between the client will use the same public key encryption which, while the public key can not reverse the decryption, the ciphertext is sent to the server with se

  • On the public key. The private key of understanding 2010-07-26

    Abstract the following information from the network, organize study under The non-symmetric key security has two main purposes: 1. Encryption to prevent eavesdropping attack: the data sender to use the data sent to the recipient's public key to the p

  • ssh public key authentication 2010-09-21

    1, Principles: Key authentication need to rely on key, first create a pair of keys (including the public key and the key, and encrypted data with the public key can only be decrypted with a key), and the public key into the needs of the remote server

  • Using the windows of the public key to connect to the ssh linux 2010-10-10

    1. In the SSH Secure Shell Client key generation settings-> User Authentication-> keys-> Generate New ...-> Next -> RSA-> next -> File: authorized_keys-> next step to complete 2. The C: \ Documents and Settings \ Administrator \ Ap

  • Add a public key ubuntu 2010-10-11

    Line of command to resolve the lack of public issues UBUNTU update source Update source, especially PPA source or other third party sources will often encounter the lack of public key questions: W: GPG error: maverick Release

  • Disable SSH remote host's public key check 2010-11-05

    SSH public key checking is an important security mechanism to prevent the middleman hijacking hackers. However, in certain circumstances, the strict inspection will destroy some of SSH public key SSH protocols rely on the automation of tasks, we need

  • Achieved using ssh public key password-free ssh 2010-11-10

    There are 2 machines 1, the server 2, the personal computer For 110 through ssh login without a password 112 Steps 1, create the key miao @ u32-192-168-1-110: ~ /. ssh $ ssh-keygen-t rsa Generating public / private rsa key