Allied-telesis AT-S60 Manuale Utente Pagina 345

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 615
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 344
Chapter 20: Encryption
Section III: Security Features 344
digital signature. The signature station publishes its public key, and then
signs its messages by encrypting them with its private key. To verify the
source of a message, the receiver decrypts the messages with the
published public key. If the message that results is valid, then the signing
station is authenticated as the source of the message.
The most common asymmetrical encryption algorithm is RSA. This
algorithm uses mathematical operations which are relatively easy to
calculate in one direction, but which have no known reverse solution.
The security of RSA relies on the difficulty of factoring the modulus of
the RSA key. Because typical key lengths of 512 bits or greater are used
in public key encryption systems, decrypting RSA encrypted messages is
almost impossible using current technology.
Asymmetrical encryption algorithms require enormous computational
resources, making them very slow when compared to symmetrical
algorithms. For this reason they are normally only used on small blocks
of data (for example, exchanging symmetrical algorithm keys), and not
for entire data streams.
Vedere la pagina 344
1 2 ... 340 341 342 343 344 345 346 347 348 349 350 ... 614 615

Commenti su questo manuale

Nessun commento