There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. Hashing, for example, is very resistant to tampering, but is not as flexible as the other methods. All three forms of encryption rely on cryptography, or the science of scrambling data. … Continue reading
Tagged with private-key …
Transport Layer Security
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. TLS and SSL encryptthe segments of network connections at the Application Layer for the Transport Layer, using asymmetric cryptography for key exchange, symmetric encryption for confidentiality, and message authentication codes for message integrity. Several versions of the protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP). TLS is an IETF standards track protocol, … Continue reading
SSH con certificados [SP]
Introducción equipo local (cliente ssh) equipo remoto (servidor ssh) cifrar con public_key de remoto descifrar con private_key de remoto firmar con private_key de local ————–> verificar firma con public_key de local Cliente (local) configuración en local colocar ficheros de certificados en $HOME/.ssh id_dsa fichero de clave privada por defecto authorized_keys fichero de claves públicas Generar claves y copiar la publica en remoto … Continue reading