First, let’s take a look at the display form of these three algorithms in the digital certificate.
Please listen to me one by one.
Signature hash algorithm.
After the data is decrypted with the public key, the hash of the transmitted content is calculated through the signature hash algorithm. Value, and compare the hash value passed along with the content to determine whether the transmitted content has been tampered with
Signature algorithm
The hash fingerprint of the transmitted information is encrypted and passed along with the content. This is to prevent people who are unwilling to modify the content of the information and the hash value in it at the same time to match, so that the signature hash algorithm step loses its true effect. Therefore, the hash value needs to be encrypted before it is sent out, which is a safety lock for more secure data transmission.
The signature algorithm is to decrypt the encrypted hash fingerprint of the transmitted information
Fingerprint Algorithm In
simple terms, it is to verify whether the received digital certificate itself has any problems.
Calculate the certificate hash value (fingerprint) through the fingerprint algorithm, and compare it with the fingerprint given in the certificate to confirm that the certificate is correct.
I still don't understand the relationships and concepts. Please check my two blog posts " Digital Certificate for Https Communication " and "RSA Encrypted Signature for Https Communication" to understand the relationship.
博客书写不易,您的点赞收藏是我前进的动力,觉得不错请点赞、 收藏 ^ _ ^ !
Related Links
- Digital certificate for Https communication https://blog.csdn.net/luo_boke/article/details/106018128
- RSA encryption signature for Https communication https://blog.csdn.net/luo_boke/article/details/106013674
- Analysis of common sorting algorithms https://blog.csdn.net/luo_boke/article/details/106762372
- Do you understand the relationship between ART, Dalvik and JVM? https://editor.csdn.net/md/?articleId=106004778