Symmetric Keys
Asymmetric Keys

-
Alice uses one of the public key algorithms to generate a pair of encryption keys: a private key, which she keeps secret, and a public key. She also prepares a message to send to Bob.
-
Alice sends the public key to Bob, unencrypted. Because her private key cannot be deduced from the public key, doing so does not compromise her private key in any way.
-
Alice can now easily prove her identity to Bob (a process known as authentication). To do so, she encrypts her message (or any portion of the message) using her private key and sends it to Bob.
-
Bob decrypts the message with Alice’s public key. This proves the message must have come from Alice, as only she has the private key used to encrypt it.
-
Bob encrypts his message using Alice’s public key and sends it to Alice. The message is secure, because even if it is intercepted, no one but Alice has the private key needed to decrypt it.
-
Alice decrypts the message with her private key.
本文详细介绍了对称密钥(私钥/秘密密钥)加密和非对称密钥(公钥/私钥)加密的概念、工作原理以及在实际应用中的区别。通过实例演示了如何使用对称密钥进行数据加密和解密,以及如何利用非对称密钥实现身份验证和安全通信。
1801

被折叠的 条评论
为什么被折叠?



