不对称加密 [英] Asymmetric Encryption

查看:137
本文介绍了不对称加密的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

明天我有高级开发考试,但我坚持加密的话题。我已经在 http://support.microsoft.com/kb/246071 上阅读了。但是我仍然感到困惑。

I have an exam tomorrow in Advanced Development, but I am stuck on the topic of Encryption. I have read up on it at http://support.microsoft.com/kb/246071. However I am still confused.

如果消息使用非对称加密加密,则使用公钥,解密器将如何知道要解密的私钥?当然这样做的唯一方法是将私人密钥公开,但是会破坏非对称加密的对象。

If a message is encrypted using Asymmetric Encryption, using the public key, how is the decryptor going to know the private key with which to decrypt it? Surely the only way to do this is to make the private key public, but that defeats the object of Asymmetric Encryption.

有人可以以非法的方式解释这个问题, -techie能听懂吗?它唯一的非对称加密我不明白,不是对称加密。感谢提前。

Can someone please explain this in a way that a non-techie would be able to understand it? Its only Asymmetric Encryption I dont understand, not Symmetric Encryption. Thanks in advance.

感谢,

Richard

编辑:所以总结一下Web应用程序的所有答案(我需要了解的具体用途):

So to sum up all the answers in the case of a web application (the specific use for which I need to know about this):


  1. 用户访问网站;

  2. 请求用户提供公钥;

  3. 用户创建公钥和私钥对,保留私有的一个私人并将公钥发送回服务器;

  4. 服务器使用公钥加密需要发送给用户的任何东西,并将信息发送给用户; / li>
  5. 用户使用他/她的私钥对服务器的响应进行解密;

  6. 用户执行所需操作,并向服务器发回响应,使用私钥对其进行加密;

  7. 服务器使用公钥进行解密。
    步骤4 - 7可能会持续很多次,或者只能发生一次,或者只能发生一次,或者只能发生4和5。

  1. User visits a website;
  2. User is requested to provide a public key;
  3. User creates public and private key-pair, keep the private one private and sends back the public key to the server;
  4. Server uses the public key to encrypt anything which needs to be sent to the user and sends the information to the user;
  5. User uses his / her private key to decrypt the response from the server;
  6. User does what they need to and sends back a response to the server, using the private key to encrypt it;
  7. Server decrypts using the public key. Steps 4 - 7 may continue many times, or they may only happen once, or only 4 and 5 may occur.



Is this all correct? If so then it should be all I need to know for the exam. I shouldnt think I would need to know any more to get the maximum 40% should a question on this subject come up - will mention the existence of certificates and signatures though.

感谢您的帮助。

请问,

理查德

编辑:嗯,我刚刚从考试中回来,我觉得很顺利。但是,密码学没有问题,但是...帮助是赞赏的。感谢所有。

Well I have just got back from my exam and it went fairly ok I think. But no question on cryptography came up, however... The help was appreciated anyway. Thanks all.

感谢,

Richard

推荐答案

爱丽丝创建了她的私钥+公钥。她把私人密钥保密。她将公开密钥公开。

Alice creates her Private Key + Public Key. She keeps her Private Key private. She makes her Public Key public.

Bob接受Alice的公开密钥(他应该首先验证,这是Alice的公钥!),并使用它来加密消息,他发送给爱丽丝。

Bob takes Alice's Public Key (he should first verify, that it's really Alice's Public Key!), and uses it to encrypt a message, which he sends to Alice.

爱丽丝可以使用私钥解密邮件。

Alice can decrypt the message using her Private Key.

这篇关于不对称加密的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆