Publicité

Cornerstones of internet security

Senior Research Analyst à VCCEdge.com
29 Aug 2010
Publicité

Contenu connexe

Publicité

Cornerstones of internet security

  1. Cornerstones of Internet security
  2.                                        A big random number is used to make a public-key/private-key pair.
  3.  
  4.  
  5.                                             Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key.
  6. Using a private key to encrypt (thus signing) a message; anyone can check the signature using the public key. Validity depends on private key security.
  7. What is a Digital Signature?
Publicité