Introduction to Public/Private Keys. Benefits of using these keys.
Encryption: It is one of the most used technique for security. Encryption works by converting messages into a format that can be used only by intended users. Three major types of encryption technologies are employed
- one way hash
- symmetric encryption
- asymmetric encryption
One Way Hash: It operates in one direction only i.e you can encrypt but can not decrypt. If we are using the same key on the same data then same hash will get generated. If the data has got changed then hash generated will be different. The hashes are used for storing passwords. We can use hashes to determine whether the data has changed or not.
Symmetric Encryption: I this, the same key is used for encryption/decryption, algorithm is fast. The distribution of keys is a major problem area. if the keys gets compromised, any one can read the data or send bogus
messages.
Asymmetric Encryption (Public/Private Key Based Encryption): In this two keys, public and private are generated. Any key can encrypt but only other key can decrypt. The key distribution is not a big problem but it is slower.
Public/Private keys, Digital Signatures, Detached Signatures, Digital Certificates, CAs, Fingerprints:
To understand these concepts properly, we are taking into consideration following good characters “vipin”, “anantika”, “nanu”, “ishu” and bad character “thief”.
Here, “anantika” wants to securely communicate with “vipin”. She has to send her internet “banking id and password” to “vipin”. For this she needs vipin’s “public key”. Here “vipin” generates his “public and private” keys. He keeps his “private” key but distributes his “public” key. Now “anantika” gets vipin’s public keys and encrypt the information with it. When the “vipin” will receive the encrypted data, he will decrypt the data with his “private” key. Now if the “thief” has been able to lay his hand on encrypted data, he/she will not be able to decrypt it because he/she is not having vipin’s private key.
GPG: GNU Privacy Guard uses public key cryptography so that users can communicate securely. In this users generates their own pair of public and private keys. Please always remember, in public key cryptography, private key can not be shared. It should be kept secret. Only public key can be distributed by various means to users with whom we want to communicate.
Courses Available in English at
AWS Certified Cloud Practitioner (CLF-C01) - Hands On
https://www.udemy.com/course/aws-certified-cloud-practitioner-hands-on/?referralCode=E7279BCF076939C81F3F
Amazon Web Services (AWS) - Hands On
https://www.udemy.com/course/hands-on-aws/?referralCode=27AC02AAF6927C8E16EA
Mastering BIND DNS Course
https://www.udemy.com/course/mastering-bind-dns/?referralCode=B3EAD168133315531446
Mastering Iptables Firewall Course
https://www.udemy.com/course/mastering-iptables-firewall/?referralCode=4C477A430BFE7B4B51BE
IP Addressing and Subnetting: Practical Approach Course
https://www.udemy.com/course/ip-address-subnetting/?referralCode=FDAA34989626DEF990F0
Apache Web Server Course
https://www.udemy.com/course/apache-web/?referralCode=E3EA2AC6EB0DEEE259AF
Kubernetes For Beginners Course
https://www.udemy.com/course/k8s-for-beginners/?referralCode=BF80146927F2E986CA50
Software Defined Networking (SDN) Made Simple Course
https://www.udemy.com/course/sdn-made-simple/?referralCode=8B0C5399C7CEB79539B6
Mastering Docker Course
https://www.udemy.com/course/docker-made-simple/?referralCode=1743EBB17092519E41D1
Linux Command Line For Beginners Course
https://www.udemy.com/course/linux-essentials/?referralCode=9B548D586ADC970E3FCF
Kubernetes Hands On Course
https://www.udemy.com/course/kubernetes-hands-on/?referralCode=07B7DEDEEA46F830743F
#cryptography #encryption #encrypted #encrypt #decrypt #decryption #privatekey #publickey #gpg #digitalsignature #digitalsignatures #keychain #fingerprint #keygen #scp #symmetric #asymmetric #linux #linuxcommands #linuxforbeginners #centos7 #centos #linuxadministration #linux_tutorial #vipingupta #techtrendswithvipingupta #opensource #opensourcesoftware #linuxoperatingsystem #linuxos #operatingsystem #linuxinhindi #filesystem #commandstutorial #command #commands #filesystem #linuxadmin #linuxadministration