{"id":31227,"date":"2017-02-07T01:42:06","date_gmt":"2017-02-07T06:42:06","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/all-about-ssl-cryptography-digicert-com.php"},"modified":"2017-02-07T01:42:06","modified_gmt":"2017-02-07T06:42:06","slug":"all-about-ssl-cryptography-digicert-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/all-about-ssl-cryptography-digicert-com.php","title":{"rendered":"All about SSL Cryptography | DigiCert.com"},"content":{"rendered":"<p><p>Background    <\/p>\n<p>    SSL (Secure Sockets Layer) is a standard security technology    for establishing an encrypted link between a server and a    clienttypically a web server (website) and a browser; or a    mail server and a mail client (e.g., Outlook). It allows    sensitive information such as credit card numbers, social    security numbers, and login credentials to be transmitted    securely. To establish this secure connection, the browser and    the server need an SSL Certificate.  <\/p>\n<p>    But how is this accomplished? How is data encrypted so that no    oneincluding the worlds biggest super computerscan crack it?  <\/p>\n<p>    This article explains the technology at work behind the scenes    of SSL encryption. It covers asymmetric and symmetric keys and    how they work together to create an SSL-encrypted connection.    It also covers different types of algorithms that are used to    create these keysincluding the mathematical equations that    make them virtually impossible to crack.  <\/p>\n<p>    Not sure you understand the basics of SSL Certificates and    technology? Learn about SSL    Certificates >>  <\/p>\n<p>    Asymmetric encryption (or public-key cryptography) uses a    separate key for encryption and decryption. Anyone can use the    encryption key (public key) to encrypt a message. However,    decryption keys (private keys) are secret. This way only the    intended receiver can decrypt the message. The most common    asymmetric encryption algorithm is RSA; however, we will    discuss algorithms later in this article.  <\/p>\n<p>    Asymmetric keys are typically 1024 or 2048 bits. However, keys    smaller than 2048 bits are no longer considered safe to use.    2048-bit keys have enough unique encryption codes that we wont    write out the number here (its 617 digits). Though larger keys    can be created, the increased computational burden is so    significant that keys larger than 2048 bits are rarely used. To    put it into perspective, it would take an average computer more    than 14 billion years to crack a 2048-bit certificate. Learn more >>  <\/p>\n<p>    Symmetric encryption (or pre-shared key encryption) uses a    single key to both encrypt and decrypt data. Both the sender    and the receiver need the same key to communicate.  <\/p>\n<p>    Symmetric key sizes are typically 128 or 256 bitsthe larger    the key size, the harder the key is to crack. For example, a    128-bit key has    340,282,366,920,938,463,463,374,607,431,768,211,456 encryption    code possibilities. As you can imagine, a brute force attack    (in which an attacker tries every possible key until they find    the right one) would take quite a bit of time to break a    128-bit key.  <\/p>\n<p>    Whether a 128-bit or 256-bit key is used depends on the    encryption capabilities of both the server and the client    software. SSL Certificates do not dictate what key size is    used.  <\/p>\n<p>    Since asymmetric keys are bigger than symmetric keys, data that    is encrypted asymmetrically is tougher to crack than data that    is symmetrically encrypted. However, this does not mean that    asymmetric keys are better. Rather than being compared by their    size, these keys should compared by the following properties:    computational burden and ease of distribution.  <\/p>\n<p>    Symmetric keys are smaller than asymmetric, so they require    less computational burden. However, symmetric keys also have a    major disadvantageespecially if you use them for securing data    transfers. Because the same key is used for symmetric    encryption and decryption, both you and the recipient need the    key. If you can walk over and tell your recipient the key, this    isnt a huge deal. However, if you have to send the key to a    user halfway around the world (a more likely scenario) you need    to worry about data security.  <\/p>\n<p>    Asymmetric encryption doesnt have this problem. As long as you    keep your private key secret, no one can decrypt your messages.    You can distribute the corresponding public key without    worrying who gets it. Anyone who has the public key can encrypt    data, but only the person with the private key can decrypt it.  <\/p>\n<p>    Public Key Infrastructure (PKI) is the set of hardware,    software, people, policies, and procedures that are needed to    create, manage, distribute, use, store, and revoke digital    certificates. PKI is also what binds keys with user identities    by means of a Certificate Authority (CA). PKI uses a hybrid    cryptosystem and benefits from using both types of encryption.    For example, in SSL communications, the servers SSL    Certificate contains an asymmetric public and private key pair.    The session key that the server and the browser create during    the SSL Handshake is symmetric. This is explained further in    the diagram below.  <\/p>\n<p>    Public-key cryptography (asymmetric) uses encryption algorithms    like RSA and Elliptic Curve Cryptography (ECC) to create the    public and private keys. These algorithms are based on the    intractability* of certain mathematical    problems.  <\/p>\n<p>    With asymmetric encryption it is computationally easy to    generate public and private keys, encrypt messages with the    public key, and decrypt messages with the private key. However,    it is extremely difficult (or impossible) for anyone to derive    the private key based only on the public key.  <\/p>\n<p>    RSA is based on the presumed difficulty of factoring large    integers (integer factorization). Full decryption of an RSA    ciphertext is thought to be infeasible on the assumption that    no efficient algorithm exists for integer factorization.  <\/p>\n<p>    A user of RSA creates and then publishes the product of two    large prime numbers, along with an auxiliary value, as their    public key. The prime factors must be kept secret. Anyone can    use the public key to encrypt a message, but only someone with    knowledge of the prime factors can feasibly decode the message.  <\/p>\n<p>    RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman the    men who first publicly described the algorithm in 1977.  <\/p>\n<\/p>\n<p>    Elliptic curve    cryptography (ECC) relies on the algebraic structure of    elliptic curves over finite fields. It is assumed that    discovering the discrete logarithm of a random elliptic curve    element in connection to a publicly known base point is    impractical.  <\/p>\n<p>    The use of elliptic curves in cryptography was suggested by    both Neal Koblitz and Victor S. Miller independently in 1985;    ECC algorithms entered common use in 2004.  <\/p>\n<p>    The advantage of the ECC algorithm over RSA is that the key can    be smaller, resulting in improved speed and security. The    disadvantage lies in the fact that not all services and    applications are interoperable with ECC-based SSL Certificates.  <\/p>\n<p>    Pre-shared key encryption (symmetric) uses algorithms like    Twofish, AES, or Blowfish, to create keysAES currently being    the most popular. All of these encryption algorithms fall into    two types: stream ciphers and block ciphers. Stream ciphers    apply a cryptographic key and algorithm to each binary digit in    a data stream, one bit at a time. Block ciphers apply a    cryptographic key and algorithm to a block of data (for    example, 64 sequential bits) as a group. Block ciphers are    currently the most common symmetric encryption algorithm.  <\/p>\n<p>    *Note: Problems that can be solved in    theory (e.g., given infinite time), but which in practice take    too long for their solutions to be useful are known as    intractable problems.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.digicert.com\/ssl-cryptography.htm\" title=\"All about SSL Cryptography | DigiCert.com\">All about SSL Cryptography | DigiCert.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Background SSL (Secure Sockets Layer) is a standard security technology for establishing an encrypted link between a server and a clienttypically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook). It allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. To establish this secure connection, the browser and the server need an SSL Certificate<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31227","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31227"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31227"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31227\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}