https://www.ruanyifeng.com/blog/2013/07/rsa_algorithm_part_two.html
encrypt methods
- asymmetric encryption
- RSA: the main(standard)
- symmetric encryption
asymetric
|
|
limit: high overhead;
both public key and prvate key can use to encrypt;
but we usually use
-
public key to send message: for: send symetic key;
if we use private key to send message, everyone have public key can decrypt it
-
generate sign: check the content is complete;
- hash;private key to encrypt the hash content
- decrypt the hash; check is equal
1. problem;
firstly,send public key to client; how to check the public key vaild;(not replace in the middle)
-
CA: 0. CA send private key and certification(public key) to client;
-
server send certification with signature
-
brower use (CA public key) to verify the signature;
-
-
ssh:
practice methoeds
-
server send public key to client; client use public key to generte session key:
-
use session key to encrypt data;
problem: 1. how to veriry the public key is from the server
1. ssl
- verify by