Certificates: Difference between revisions

Line 2:
__TOC__
<br />
 
= Public-key cryptography =
 
*Asymmetric cryptography is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
*The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions.
*Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.
 
*In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.
 
;Digital Signature
*A sender can combine a message with a private key to create a short digital signature on the message.
*Anyone with the sender's corresponding public key can combine the same message and the supposed digital signature associated with it to verify whether the signature was valid, i.e. made by the owner of the corresponding private key.
 
;Prime Numbers & Encryption
 
*Product of 2 large random Prime Numbers is the backbone of Encryption.
11 x 17 = 187
 
*Cracking the encryption means figuring out the 2 factors.
*Using Brute Force it takes decades with today's computers.
*If 2 numbers are known (a private key), it takes a split second.
*The numbers in largest known prime number: 17,425,170.
*The Public key is made up in part by calculating the number of integers that share no common factors that are less than the product of 2 Prime Numbers.
 
= X.509 Certificate =