Solved

Easy understanding of items for secure communication

Posted on 2014-11-16
1
128 Views
Last Modified: 2015-03-03
I'm not clear about following items about secure communication and their relation, e.g.Certificate servers , public keys. private key, Public key infrastructure. encryption algorithms... Could anyone explain clear? Thanks
0
Comment
Question by:litmic
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 70

Accepted Solution

by:
Qlemo earned 500 total points
ID: 40445791
That's a big field of knowledge, and difficult to summarize in a few sentences, but I will try for the context I guess you are asking this in.

Certificates are used to authenticate (it is really the address I want to talk to), to confirm the address as trustworthy (certain prerequisits fulfilled to make sure it is no fake address, malicious, ...) and to provide a public key for encryption.
The public key is something everyone can use to send encrypted data to the address. It can only be decrypted by the keyholder (or whoever has the private key). The private key is not derivable from data by any means (ideally - in fact depends on encryption algorithm and key strength, and collected sample data).
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question