Public Key Configuration; Public Key Algorithm Overview; Basic Concepts; Key Algorithm Types - H3C S5120-SI Series Operation Manual

Hide thumbs Also See for S5120-SI Series:
Table of Contents

Advertisement

1

Public Key Configuration

When configuring public keys, go to these sections for information you are interested in:

Public Key Algorithm Overview

Configuring the Local Asymmetric Key Pair
Configuring the Public Key of a Peer
Displaying and Maintaining Public Keys
Public Key Configuration Examples
Public Key Algorithm Overview

Basic Concepts

Algorithm: A set of transformation rules for encryption and decryption.
Plain text: Information without being encrypted.
Cipher text: Encrypted information.
Key: A string of characters that controls the transformation between plain text and cipher text. It
participates in both the encryption and decryption.

Key Algorithm Types

As shown in
Figure
is transmitted in the network, and then is decrypted by the receiver to obtain the original pain text.
Figure 1-1 Encryption and decryption
There are two types of key algorithms, based on whether the keys for encryption and decryption are the
same:
Symmetric key algorithm: The same key is used for both encryption and decryption. Commonly
used symmetric key algorithms include AES and DES.
Asymmetric key algorithm: Also called public key algorithm. Both ends have their own key pair,
consisting of a private key and a public key. The private key is kept secret while the public key may
be distributed widely. The private key cannot be practically derived from the public key. The
information encrypted with the public key/private key can be decrypted only with the corresponding
private key/public key.

Asymmetric Key Algorithm Applications

Asymmetric key algorithms can be used for encryption and digital signature:
1-1, the information is encrypted before being sent for confidentiality. The cipher text
1-1

Advertisement

Table of Contents
loading

Table of Contents