How to perform encryption and decryption using public and private keys.
Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed
- one way hash
- symmetric encryption
- asymmetric encryption
One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not.
Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus
messages.
Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower.
Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints:
To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”.
Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key.
GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate.
Courses Available in English at
AWS Certified Cloud Practitioner (CLF-C01) - Hands On
[ Ссылка ]
Amazon Web Services (AWS) - Hands On
[ Ссылка ]
Mastering BIND DNS Course
[ Ссылка ]
Mastering Iptables Firewall Course
[ Ссылка ]
IP Addressing and Subnetting: Practical Approach Course
[ Ссылка ]
Apache Web Server Course
[ Ссылка ]
Kubernetes For Beginners Course
[ Ссылка ]
Software Defined Networking (SDN) Made Simple Course
[ Ссылка ]
Mastering Docker Course
[ Ссылка ]
Linux Command Line For Beginners Course
[ Ссылка ]
Kubernetes Hands On Course
[ Ссылка ]
#cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration
Ещё видео!