Tagged with private-key

Types of Encryption

There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. Hashing, for example, is very resistant to tampering, but is not as flexible as the other methods. All three forms of encryption rely on cryptography, or the science of scrambling data. … Continue reading

Transport Layer Security

Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encryptthe segments of network connections at the Application Layer for the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for confidentiality, and message authentication codes for message integrity. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). TLS is an IETF standards track protocol, … Continue reading

SSH con certificados [SP]

Introducción equipo local (cliente ssh)                                equipo remoto (servidor ssh) cifrar con  public_key de remoto                     descifrar con  private_key de remoto firmar con private_key de local ————–> verificar firma con public_key de local  Cliente (local) configuración en local colocar ficheros de certificados en $HOME/.ssh id_dsa                 fichero de clave privada por defecto authorized_keys    fichero de claves públicas Generar claves y copiar la publica en remoto … Continue reading