User Tools

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
основы_криптографии_для_начинающих [2022/06/13 14:12]
sss
основы_криптографии_для_начинающих [2022/06/13 14:14] (current)
sss
Line 10: Line 10:
  
 ====== Public-Key (Asymmetric) ====== ====== Public-Key (Asymmetric) ======
-[[https://en.wikipedia.org/wiki/Public-key_cryptography|(Asymmetric]] encryption was invented to solve the problem of key transmission over an insecure connection channel existing in symmetric encryption. It works as follows:+[[https://en.wikipedia.org/wiki/Public-key_cryptography|Asymmetric]] encryption was invented to solve the problem of key transmission over an insecure connection channel existing in symmetric encryption. It works as follows:
   - Instead of the single shared encryption key for all participants, there is a pair of keys (open/public and closed/private) for each of the participants   - Instead of the single shared encryption key for all participants, there is a pair of keys (open/public and closed/private) for each of the participants
     - A public key is a key that is publicly available to all who wish to encrypt data that can only be decrypted by a private key from the same pair of keys.     - A public key is a key that is publicly available to all who wish to encrypt data that can only be decrypted by a private key from the same pair of keys.
Line 19: Line 19:
 At the moment, the most commonly used asymmetric encryption for exchanging symmetric encryption keys, [[https://en.wikipedia.org/wiki/Transport_Layer_Security|ssl/tls]], uses this exact model. At the moment, the most commonly used asymmetric encryption for exchanging symmetric encryption keys, [[https://en.wikipedia.org/wiki/Transport_Layer_Security|ssl/tls]], uses this exact model.
  
-===== [[https://en.wikipedia.org/wiki/End-to-end_encryption|end-to-end]] =====+===== end-to-end ===== 
 + 
 +[[https://en.wikipedia.org/wiki/End-to-end_encryption|wikipedia article on subject]] 
 As the name suggests, this is a method of applying encryption when data is encrypted for a recipient, which makes the transfer of such data through intermediaries or centralized servers relatively secure. Unlike classic, older models in e2e encryption, the message is not encrypted for an intermediary or server that will send the message to the recipient, but directly to the recipient, which greatly reduces the risk of data leakage, but does not solve the problem of metadata leakage. As the name suggests, this is a method of applying encryption when data is encrypted for a recipient, which makes the transfer of such data through intermediaries or centralized servers relatively secure. Unlike classic, older models in e2e encryption, the message is not encrypted for an intermediary or server that will send the message to the recipient, but directly to the recipient, which greatly reduces the risk of data leakage, but does not solve the problem of metadata leakage.
  
-===== [[https://en.wikipedia.org/wiki/Forward_secrecy|PFS]] =====+===== PFS ===== 
 + 
 +[[https://en.wikipedia.org/wiki/Forward_secrecy|wikipedia article on subject]] 
 In a very short and simplified way, PFS is a method of using a combination of encryption algorithms so that encrypted data can no longer be decrypted following a successful decryption by the receiver. This is usually done by using a one-time "session" key that is immediately destroyed after successfully decrypting the encrypted data, which makes it impossible for a third party to decrypt even if it obtains access to the underlying encryption keys that both the sender and receiver have. In a very short and simplified way, PFS is a method of using a combination of encryption algorithms so that encrypted data can no longer be decrypted following a successful decryption by the receiver. This is usually done by using a one-time "session" key that is immediately destroyed after successfully decrypting the encrypted data, which makes it impossible for a third party to decrypt even if it obtains access to the underlying encryption keys that both the sender and receiver have.

This website uses cookies. By using the website, you agree with storing cookies on your computer. Also, you acknowledge that you have read and understand our Privacy Policy. If you do not agree, please leave the website.

More information