亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? pgp.html

?? a collection of mega hacking tools
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<br>

A cryptosystem can be weak (easy to break), or it can be strong (hard to break). The strength of a cryptosystem is measured in the time and resources you need to get make a successful attack. Modern strong cryptosystems can withstand a brute force attack using all the computers in the world - or rather, it would take an inordinately long time (currently about 10^9 times the age of the universe). But you never know - tomorrow may bring a mathematical technique to attack these cryptosystems by a method other than brute force.<br>

<br>

<a name="5">How does Cryptography work?</a><br>

===========================<br>

<br>

A cipher uses a key (a piece of data) coupled with an encryption algorithm to encrypt data (plain text). Different keys produce different ciphertext, of course. So the strength of encrypted data relies on two factors - the strength of cipher and the safety of the key. Therefore it is very advisable to choose the key very carefully and to keep it secure (best solution is to put it into a brain-cell, if possible:)). All those components mentioned above build a cipher. A cryptosystem (like PGP) uses a combination of various different ciphers .<br>

<br>

<a name="6">Conventional Cryptography</a><br>

=========================<br>

<br>

This type of encryption uses the same key to encrypt and decrypt data (plaintext). An example of a conventional cryptosystem is DES (The Data Encryption Standard) which is recommended by the Federal Government for commercial applications (despite the fact that it can be broken very easily). Conventional Cryptography has both pluses and minuses. It is very fast and suitable for data which won't be used by anyone except by the person who encrypted it. Unfortunately the secure key distribution is very difficult task to accomplish: you need to agree with a key beforehand, which is very impractical nowadays, because you cannot trust phone companies, couriers, e-mail and internet services. Here arises a question: how do you get the key to the recipient without someone intercepting it? The best way would be to have different keys for the sender and recipient.<br>

<br>

<a name="7">Public Key Cryptography</a><br>

=======================<br>

<br>

Which solves the secure key distribution problem. Whitefield Diffie and Martin Helman introduced the concept of Public Key Cryptography in 1975. However, there are some rumours that British Secret Intelligence Service invented it few years before, but kept in secret and did nothing with it.<br>

Public key cryptography is an asymmetric system and uses two keys (a pair): a public key, used for encryption and a private key, used for decryption. The public key is published worldwide and the personal is kept in secret. Anyone and everyone can encrypt data with your public key, but only you (or to be more exact the person who has your private key) can decrypt the ciphertext.<br>

<br>

<a name="8">How Does PGP Work?</a><br>

==================<br>

<br>

As mentioned above, PGP is mixed cryptosystem - that is, it combines both conventional and public key cryptography. PGP operates in this way:<br>

<br>

A) Encryption:<br>

<br>

1) First, PGP compresses plaintext. It is useful for several reasons: you need less space on hard disk. smaller message means saving time (and money), when sending it via internet, and increases the strength of encryption, because in compressed data there are fewer patterns than in uncompressed and pattern recognition is widely used by cryptanalists to break a cipher.<br>

2) PGP then generates a single-use encryption key, known as a session key. It is random number, generated from random data such as the contents of your PC's RAM, mouse movements, positions of windows on the desktop - uou get the idea. PGP uses a very fast and secure conventional cipher (CAST) and this session key to encrypt the data to produce ciphertext.<br>

3) After encrypting of the data, the session key is then encrypted to the recipient's public key and both the public key-encrypted session key and the ciphertext are transmitted.<br>

<br>

B) Decryption:<br>

<br>

1) PGP uses the recipient's private key to recover the session key.<br>

2) The session key is used to decrypt the conventionally encrypted ciphertext.<br>

3) The compressed data is decompressed.<br>

<br>

The combinations of conventional and public keys provide cryptography with very fast and secure encryption system. This is achieved by the speed of conventional algorithms and safety of public key.<br>

<br>

<a name="9">A Few Words About The Keys...</a><br>

=============================<br>

<br>

A key is a piece of data which is used by cryptographic algorithm to produce cyphertext. In fact, keys are huge prime numbers. The size of the key is measured in bits - the bigger the key, the more secure the encryption. The comparison of conventional and public key sizes is rather puzzling - conventional 128-bit key is the same strength as 3072-bit public key. The thing is, that you can't compare those types of the key, because of the specific algorithms used for each type of cryptography. (you can't compare trains and brains, can you?).<br>

To gain as much security as you can, always pick the biggest-size keys. This is because (given enough time and processing power) any public key can eventually be found. However, 2048-bit keys are in fact so difficult to break that it would take AT LEAST 2,000,000,000 years to break it using all the processing power to be found on the planet at the moment.<br>

Keys are stored in encrypted form. Typically you use two keyrings (files on hard disk) - one for public keys and other for private. Don't lose private key ring, because all information which was encrypted to keys on that ring will never be accessible (if you won't compromise the cipher, of course).<br>

<br>

<a name="10">..And About Digital Signatures</a><br>

==============================<br>

<br>

Just like written signatures, digital signatures provide authentication of the information's origin. Usually this feature of cryptography is much more widely used than encryption. The digital signature is 'impossible' to fake. In short - when you are dealing with this type of signature - you can mostly always be sure you are dealing with the right person (in the sense of authentication, of course).<br>

The digital signature works this way:<br>

1) The plaintext gets encrypted with your private key.<br>

2) If the information can be decrypted with the public key of the yours, then that information comes from you.<br>

<br>

The digital signatures are the main way to verify the validation of the public key.<br>

<br>

<a name="11">The Message Digest</a><br>

==================<br>

<br>

How do you make sure that no-one is able to just copy and paste your signature from your e-mail to his and claim it came from you? Well, you use a message digest.<br>

<br>

The message digest is the output of a hash function. This function takes message of any length and produces a fixed-length, 64-bit output (that's right - it's the same as the message digest hash mentioned earlier). The mathematical side of this function ensures that even if the data differs very slightly, you get entirely different output (known as a message digest). The private key and the digest are used to generate the signature, which is then transmitted along with plaintext. The hash function ensures that no one can take your signature and use it as his own because in such a case verification fails.<br>

<br>

<a name="12">Digital Certificates</a><br>

====================<br>

<br>

Of course, when you use public key crytposystem you want to be sure you are encrypting to the right person's key. This is  the problem of the trust. Let's say someone posts a fake key with a name of the person who you are writing to. When you encrypt the data and send it to the "recipient", the data goes to the wrong person. In a public key environment, it is very important that you are sure you are using the public key of the intended recipient. One way out is to encrypt only to keys that the owner of has handed to you personally (on a floppy disk, for example). But this is very inconvenient - first, sometimes you don't even know the recipient and the second, what would you do if you need to send some data to a person who is not available physically - in a plane or anywhere else wher you can't meet them physically? Send a pigeon with a note?<br>

Digital certificates simplify this task of checking that you have the correct key. A digital certificate is a piece of data that you can use like a normal physical certificate. This information is included with a person's public key to provide help to verifying the validity of the key. Certificates are used to prevent people substituting one person's key for another.<br>

<br>

A digital certificate consists of:<br>

1) a public key<br>

2) certificate information (some information about the user: name, ID and so on)<br>

3) one or more digital signatures<br>

<br>

The digital signature on a certificate shows that some person approves the certificate information. The digital signature does not attest to the authenticity of the certificate as a whole; it vouches only that the signed identity goes along with the public key. In short - a certificate is a public key with several forms of ID attached, and approval from some other trusted individual(s). You get most of the benefits of digital certification when it is necessary to exchange public keys with someone else and it is impossible to do manually. Manual public key distribution has its advantages, but is useful only to a certain point. Sometimes it is necessary to put everything in one place - central storage, for instance, with exchange of public keys for anyone who need them. Systems that store such data are called Certificate Servers and systems that provide some additional key management features are called Public Key Infrastructures.<br>

Certificate Servers (aka cert. server / key server) are nothing more than databases that allow users to submit and retrieve digital certificates. Such a server can and usually does provide some administrative features. These features enable a company to maintain its security policies and so on.<br>

A Public Key Infrastructure contains the same the certificate storage facilities of a certificate server, but also provides certificate management facilities - the ability to issue, revoke, store, retrieve and trust certificates. PKI introduces the Certification Authority (CA), which is a person who has authorisation to issue certificates for some company's computer  users. A CA creates certificates and digitally signs them, using the CA's private key. If you trust the CA, you can almost always trust the holder of their certificate.<br>

<br>

<a name="13">Certificate Formats</a><br>

===================<br>

<br>

A digital certificate is a collection of some identifying information imbedded together with a public key and the signatures of people who trust it's authenticity. PGP recognises two different certificate formats:<br>

1) PGP certificates;<br>

2) X.509 certificates.<br>

<br>

A PGP certificate consists of:<br>

1) the PGP version number, which identifies the version of PGP program which was used to create the associated key.<br>

2) The certificate holder's public key together with the algorithm of the key, which can be RSA or DH/DSS (recommended).<br>

3) The certificate validity period which indicates when the certificate will expire;<br>

4) The symmetric encryption algorithm for the key. This information indicates the encryption algorithm to which the certificate owner prefers to have information encrypted. These algorithms are CAST (recommended), IDEA or Triple-DES.<br>

<br>

<a name="14">Validity and trust</a><br>

==================<br>

<br>

Validity is confidence that something (a public key or certificate, for example) belongs to its real owner. Validity is very important in public key systems where you must know if the certificate is authentic or not.<br>

When you are sure that some certificate belongs to someone, you can sign the copy on your key ring to attest to the fact that you've checked the certificate and that it is an authentic one. If you export the signature to a certificate server others will know that you approved it. To believe someone who has signed approval of any certificate, you need to trust them.<br>

You can check validity by meeting the intended recipient and taking the key from him physically. The other way is to use fingerprints. A PGP fingerprint is a hash of the certificate (similar to a message digest). All fingerprints are unique. It can appear as hexadecimal number or a series of biometric words, which are phonetically distinct. When you have fingerprints and know the voice of the owner, you can just call him and ask him to read his. But sometimes, you don't know the voice - in such cases you need to trust some third party, like a CA.<br>

But don't forget that unless the owner of the key hands it to you personally you must trust some third party to tell you that this key is valid.<br>

<br>

<a name="15">Passwords and passphrases</a><br>

=========================<br>

<br>

Almost everyday, when you are using computers you need to enter a secret combination of characters (a password) to access some information. So you should be familiar with the concept. If not, you have been reading the wrong tutorial.<br>

A passphrase is a longer version of a password and is supposed to be more secure. A passphrase helps you to be more secure against dictionary attacks (compromising PGP will be covered in Part II - Compromising PGP). The best passphrases are relatively long and complex, containing non-alphabetic characters. PGP uses a passphrase to encrypt your private key on your disk using a hash of your passphrase as the secret key. You use the passphrase to decrypt and use your private key. A<br>

passphrase should be hard for you to forget and difficult for others to guess. It should be something already firmly embedded in your long-term memory, rather than something you make up from scratch, because without your passphrase your private key is totally useless and nothing can be done about it. At all.<br>

</tt>

</body>

</html>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产福利91精品| 日本一区二区免费在线| 中文无字幕一区二区三区| 成人一级黄色片| 亚洲精品欧美综合四区| 日韩一区二区三区免费看| 国产69精品久久99不卡| 亚洲综合激情小说| 91热门视频在线观看| 91激情五月电影| 91精品国产综合久久精品 | 久久久久久一级片| 99r精品视频| 日本中文字幕不卡| 亚洲图片欧美激情| 亚洲精品一区二区三区精华液| av中文字幕在线不卡| 日韩电影在线免费观看| 国产精品不卡一区| 日韩欧美亚洲一区二区| 91在线精品秘密一区二区| 午夜精品福利视频网站| 精品日韩一区二区| 欧美午夜宅男影院| 国产成+人+日韩+欧美+亚洲| 亚洲不卡一区二区三区| 欧美高清在线一区二区| 日韩一级黄色片| 91久久香蕉国产日韩欧美9色| 精品一区在线看| 欧美日韩高清一区二区| 亚洲午夜免费电影| 久久亚洲欧美国产精品乐播 | 国产宾馆实践打屁股91| 天堂精品中文字幕在线| 国产免费成人在线视频| 欧美一级二级三级乱码| 在线观看中文字幕不卡| 成人app网站| 国产伦精一区二区三区| 老司机免费视频一区二区三区| 亚洲午夜一区二区| 亚洲免费观看在线视频| 国产精品午夜在线| 久久久久久一二三区| 欧美日本国产一区| 欧美性猛交xxxxxxxx| 91精彩视频在线| 99久久婷婷国产综合精品电影| 在线精品亚洲一区二区不卡| www.久久久久久久久| 岛国精品在线播放| 国产一区二区三区四| 亚洲欧洲成人自拍| 日韩三级中文字幕| 欧美一区午夜视频在线观看| 欧美日韩亚洲综合一区| 精品视频色一区| 欧美亚洲动漫制服丝袜| 欧美私模裸体表演在线观看| 91黄色免费版| 欧美日韩精品免费| 3d动漫精品啪啪| 日韩欧美亚洲一区二区| 精品国产乱码久久久久久浪潮 | 欧美一级在线免费| 欧美精品免费视频| 欧美精品久久天天躁| 欧美精品777| 91精品国产综合久久久久久久久久| 欧美精品三级在线观看| 欧美日韩一区二区欧美激情 | 天堂一区二区在线| 欧美a级理论片| 欧美日韩免费观看一区二区三区| 日本网站在线观看一区二区三区| 成人综合在线视频| 欧美精品一区二区在线观看| 国产精品美女久久久久久久网站| 欧美日韩在线免费视频| 欧美日韩视频不卡| 欧美精品一区二区三区高清aⅴ | 色偷偷久久人人79超碰人人澡| 欧美自拍丝袜亚洲| 日韩欧美视频在线 | 亚洲欧洲99久久| 一区二区三区波多野结衣在线观看| 一区二区三区国产精品| 丝袜亚洲另类欧美综合| 亚洲成人av电影| 奇米四色…亚洲| 成人免费看视频| 欧美日韩亚州综合| 久久久综合视频| 成人免费在线播放视频| 偷拍日韩校园综合在线| 蜜桃91丨九色丨蝌蚪91桃色| 成人aa视频在线观看| 欧美日韩在线综合| 2020国产精品久久精品美国| 自拍av一区二区三区| 国产精品亚洲视频| 性感美女极品91精品| 美女久久久精品| 99久久国产免费看| 欧美揉bbbbb揉bbbbb| 国产亚洲女人久久久久毛片| 夜夜嗨av一区二区三区| 国产伦精品一区二区三区免费迷| 91性感美女视频| 精品美女被调教视频大全网站| 国产精品麻豆99久久久久久| 日韩成人免费看| 成人av免费在线| 日韩欧美自拍偷拍| 亚洲欧洲精品一区二区三区| 久久精品噜噜噜成人av农村| 91视频在线看| 国产亚洲一区字幕| 日韩av电影免费观看高清完整版 | 成人一区二区视频| 另类小说一区二区三区| 精品在线观看免费| 99re这里都是精品| www亚洲一区| 石原莉奈一区二区三区在线观看| 久久精品国产一区二区三| 91国偷自产一区二区三区观看| ww久久中文字幕| 视频在线观看国产精品| 成人高清视频在线观看| 日韩美一区二区三区| 亚洲自拍偷拍麻豆| 成人精品一区二区三区四区 | 中文字幕亚洲视频| 亚洲第四色夜色| 成人av在线播放网站| 日韩欧美综合在线| 亚洲一区二区三区自拍| 99re热视频这里只精品| 国产日韩精品久久久| 九九九精品视频| 欧美一级免费大片| 首页综合国产亚洲丝袜| 欧美在线观看视频在线| 成人黄色网址在线观看| 欧美亚洲禁片免费| 国产欧美日韩精品a在线观看| 久久成人羞羞网站| 欧美变态tickle挠乳网站| 亚洲午夜精品在线| 欧美在线免费播放| 亚洲精品菠萝久久久久久久| 9色porny自拍视频一区二区| 国产婷婷色一区二区三区四区| 久久国产尿小便嘘嘘| 日韩欧美高清在线| 视频一区中文字幕国产| 日韩美女视频在线| 精品一区二区免费看| 久久只精品国产| 国产精品资源在线看| 国产精品嫩草99a| 国产成人精品免费看| 亚洲欧美日韩国产手机在线 | 欧美视频自拍偷拍| 偷窥少妇高潮呻吟av久久免费| 欧美日本一区二区在线观看| 亚洲丶国产丶欧美一区二区三区| 成人激情小说网站| 亚洲bt欧美bt精品| 欧美一级一区二区| 国产精品538一区二区在线| 中文字幕不卡的av| 色婷婷精品大在线视频| 亚洲精品免费在线| 精品少妇一区二区三区在线视频| 精品一区二区三区视频| 中文字幕精品一区二区精品绿巨人 | 日韩精品一区二区三区swag | 一区二区三区精品在线观看| 欧美性极品少妇| 老司机免费视频一区二区| 久久久久久久久久看片| 99久久99久久精品免费看蜜桃| 中文字幕五月欧美| 在线播放一区二区三区| 狠狠色丁香婷婷综合久久片| 国产精品伦理一区二区| 欧美私模裸体表演在线观看| 亚洲一卡二卡三卡四卡五卡| 欧美大白屁股肥臀xxxxxx| 粉嫩av亚洲一区二区图片| 亚洲欧美激情插| 欧美日韩国产乱码电影| 国产成人精品免费一区二区| 亚洲午夜久久久久久久久电影网 | 精品国产免费一区二区三区四区 | 视频一区二区三区在线| 久久久www成人免费毛片麻豆 |