Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
основы_криптографии_для_начинающих [2022/06/13 14:12] – sss | основы_криптографии_для_начинающих [2022/06/13 14:14] (current) – sss | ||
---|---|---|---|
Line 10: | Line 10: | ||
====== Public-Key (Asymmetric) ====== | ====== Public-Key (Asymmetric) ====== | ||
- | [[https:// | + | [[https:// |
- Instead of the single shared encryption key for all participants, | - Instead of the single shared encryption key for all participants, | ||
- A public key is a key that is publicly available to all who wish to encrypt data that can only be decrypted by a private key from the same pair of keys. | - A public key is a key that is publicly available to all who wish to encrypt data that can only be decrypted by a private key from the same pair of keys. | ||
Line 19: | Line 19: | ||
At the moment, the most commonly used asymmetric encryption for exchanging symmetric encryption keys, [[https:// | At the moment, the most commonly used asymmetric encryption for exchanging symmetric encryption keys, [[https:// | ||
- | ===== [[https:// | + | ===== end-to-end ===== |
+ | |||
+ | [[https:// | ||
As the name suggests, this is a method of applying encryption when data is encrypted for a recipient, which makes the transfer of such data through intermediaries or centralized servers relatively secure. Unlike classic, older models in e2e encryption, the message is not encrypted for an intermediary or server that will send the message to the recipient, but directly to the recipient, which greatly reduces the risk of data leakage, but does not solve the problem of metadata leakage. | As the name suggests, this is a method of applying encryption when data is encrypted for a recipient, which makes the transfer of such data through intermediaries or centralized servers relatively secure. Unlike classic, older models in e2e encryption, the message is not encrypted for an intermediary or server that will send the message to the recipient, but directly to the recipient, which greatly reduces the risk of data leakage, but does not solve the problem of metadata leakage. | ||
- | ===== [[https:// | + | ===== PFS ===== |
+ | |||
+ | [[https:// | ||
In a very short and simplified way, PFS is a method of using a combination of encryption algorithms so that encrypted data can no longer be decrypted following a successful decryption by the receiver. This is usually done by using a one-time " | In a very short and simplified way, PFS is a method of using a combination of encryption algorithms so that encrypted data can no longer be decrypted following a successful decryption by the receiver. This is usually done by using a one-time " |