Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Easy understanding of items for secure communication

Posted on 2014-11-16
1
Medium Priority
?
143 Views
Last Modified: 2015-03-03
I'm not clear about following items about secure communication and their relation, e.g.Certificate servers , public keys. private key, Public key infrastructure. encryption algorithms... Could anyone explain clear? Thanks
0
Comment
Question by:litmic
1 Comment
 
LVL 71

Accepted Solution

by:
Qlemo earned 1500 total points
ID: 40445791
That's a big field of knowledge, and difficult to summarize in a few sentences, but I will try for the context I guess you are asking this in.

Certificates are used to authenticate (it is really the address I want to talk to), to confirm the address as trustworthy (certain prerequisits fulfilled to make sure it is no fake address, malicious, ...) and to provide a public key for encryption.
The public key is something everyone can use to send encrypted data to the address. It can only be decrypted by the keyholder (or whoever has the private key). The private key is not derivable from data by any means (ideally - in fact depends on encryption algorithm and key strength, and collected sample data).
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question