链接:https://pan.baidu.com/s/1n6tYUtYYL_3Gn_Mjp4QEWg?pwd=h23n
提取码:h23n
Two fundamental types of encryption algorithms are Block Ciphers
and Stream Ciphers
.
Popular examples include Advanced Encryption Standard (AES), a type of block cipher and RC4, a type of stream cipher.
Message digests (aka hash functions), MACs (Message Authentication Codes), HMACs (Hash-based Message Authentication Codes), and KDFs (Key Derivation Functions) are cryptographic tools designed for ensuring data integrity and authenticity.
Authenticated encryption modes like GCM (Galois/Counter Mode) combine confidentiality, integrity, and authenticity in a single process - providing robust protection to your data.
Key wrapping refers to securely encapsulating (or ‘wrapping’) keys under a master key. This is used in great part to safeguard the lifecycle of keys.
The SealedObject is a feature in Java Cryptography Architecture (JCA) that allows for the serialization and de-serialization of encrypted objects, containing the serialized representation of an object and the parameters used during encryption.
Password-Based Key Generation involves generating a cryptographic key from a user password. An important function used for this purpose is Password-Based Key Derivation Function 2 (PBKDF2). It applies a pseudorandom function to the input password along with a salt and repeats the process many times to generate a key.
Key splitting involves dividing a key into multiple parts, and it’s typically used to add a layer of security when storing or transmitting a key. A well-known method for key splitting is the Shamir’s Secret Sharing algorithm.
Digital signatures use public-key cryptography to provide authentication, non-repudiation, and integrity, ensuring the receiver of a message that it has indeed come from the legitimate sender and hasn’t been tampered with during transit.
Key transport involves securely transmitting a key from one party to another. Key agreement, on the other hand, involves two or more parties generating a shared secret key, each contributing a key component.
Key exchange protocols like the Diffie–Hellman help to establish shared keys securely even over insecure channels.
X.509 is a standard defining the format of public key certificates. A certificate binds a public key to an entity.
Attribute certificates, on the other hand, are a kind of credential that can be used to create a wide range of flexible, robust, secure identity systems. They provide privileges or access rights to a user rather than just confirming their identity.
Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) are ways used to deal with certificate revocation - the process of revoking a previously issued certificate before its expiration in case it’s compromised or no longer needed.
Certificate Path or Chain is a list of certificates, used to authenticate an entity, starting from a trusted root certificate authority (CA) to the entity’s certificate.
Key and certificate storage involves securely storing cryptographic keys and certificates. This includes Hardware Security Modules (HSMs), cloud-based HSM services, and protected files.
Certificate Signing Request (CSR) is a message sent from an applicant to a certificate authority to apply for a digital certificate. Certificate management, also known as Public Key Infrastructure (PKI) management, is the process of managing digital certificates to enable secure communication in a network.
In conclusion, the successful application of these cryptographic tools and processes forms the basis of a robust security ecosystem, allowing organizations to secure their data in transit and at rest, ensure its integrity and authenticity, and provide non-repudiation where necessary.
GPT
oracle.com
youtube.com