filmov
tv
Encryption and Decryption using Public and Private Key | Encryption, Signatures and Hashing
![preview_player](https://i.ytimg.com/vi/3ELCSd27dHc/maxresdefault.jpg)
Показать описание
How to perform encryption and decryption using public and private keys.
Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed
- one way hash
- symmetric encryption
- asymmetric encryption
One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not.
Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus
messages.
Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower.
Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints:
To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”.
Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key.
GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate.
Courses Available in English at
AWS Certified Cloud Practitioner (CLF-C01) - Hands On
Amazon Web Services (AWS) - Hands On
Mastering BIND DNS Course
Mastering Iptables Firewall Course
IP Addressing and Subnetting: Practical Approach Course
Apache Web Server Course
Kubernetes For Beginners Course
Software Defined Networking (SDN) Made Simple Course
Mastering Docker Course
Linux Command Line For Beginners Course
Kubernetes Hands On Course
#cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration
Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed
- one way hash
- symmetric encryption
- asymmetric encryption
One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not.
Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus
messages.
Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower.
Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints:
To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”.
Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key.
GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate.
Courses Available in English at
AWS Certified Cloud Practitioner (CLF-C01) - Hands On
Amazon Web Services (AWS) - Hands On
Mastering BIND DNS Course
Mastering Iptables Firewall Course
IP Addressing and Subnetting: Practical Approach Course
Apache Web Server Course
Kubernetes For Beginners Course
Software Defined Networking (SDN) Made Simple Course
Mastering Docker Course
Linux Command Line For Beginners Course
Kubernetes Hands On Course
#cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration