Solved

Easy understanding of items for secure communication

Posted on 2014-11-16
1
132 Views
Last Modified: 2015-03-03
I'm not clear about following items about secure communication and their relation, e.g.Certificate servers , public keys. private key, Public key infrastructure. encryption algorithms... Could anyone explain clear? Thanks
0
Comment
Question by:litmic
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 70

Accepted Solution

by:
Qlemo earned 500 total points
ID: 40445791
That's a big field of knowledge, and difficult to summarize in a few sentences, but I will try for the context I guess you are asking this in.

Certificates are used to authenticate (it is really the address I want to talk to), to confirm the address as trustworthy (certain prerequisits fulfilled to make sure it is no fake address, malicious, ...) and to provide a public key for encryption.
The public key is something everyone can use to send encrypted data to the address. It can only be decrypted by the keyholder (or whoever has the private key). The private key is not derivable from data by any means (ideally - in fact depends on encryption algorithm and key strength, and collected sample data).
0

Featured Post

Plug and play, no additional software required!

The ATEN UE3310 USB3.1 Gen1 Extender Cable allows users to extend the distance between the computer and USB devices up to 10 m (33 ft). The UE3310 is a high-quality, cost-effective solution for professional environments such as hospitals, factories and business facilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Part Two of the two-part Q&A series with MalwareTech.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question