首页 > 其他 > 详细

Public Keys, Private Keys, and Certificates

时间:2015-02-25 00:45:50      阅读:313      评论:0      收藏:0      [点我收藏+]

Public Keys, Private Keys, and Certificates

When performing authentication, SSL uses a technique called public-key cryptography.

Public-key cryptography is based on the concept of a key pair, which consists of a public key and a private key. Data that has been encrypted with a public key can be decrypted only with the corresponding private key. Conversely, data that has been encrypted with a private key can be decrypted only with the corresponding public key.

技术分享

The owner of the key pair makes the public key available to anyone, but keeps the private key secret.

certificate verifies that an entity is the owner of a particular public key.

Certificates that follow the X.509 standard contain a data section and a signature section. The data section includes such information as:

  • The Distinguished Name of the entity that owns the public key

  • The Distinguished Name of the entity that issued the certificate

  • The period of time during which the certificate is valid

  • The public key itself

You can obtain a certificate from a Certificate Authority (CA) such as VeriSign. Alternately, you can create a self-signed certificate, in which the owner and the issuer are the same.

An organization that issues certificates can establish a hierarchy of CAs. The root CA has a self-signed certificate. Each subordinate CA has a certificate that is signed by the next highest CA in the hierarchy. certificate chain is the certificate of a particular CA, plus the certificates of any higher CAs up through the root CA.

    Public Keys, Private Keys, and Certificates

    原文:http://blog.csdn.net/opengl_es/article/details/43928793

    (0)
    (0)
       
    举报
    评论 一句话评论(0
    关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
    © 2014 bubuko.com 版权所有
    打开技术之扣,分享程序人生!