keytool generate key

Description/Concept:

Certificate authentication method:

      Key, public key, and certificate creation process: the service party first creates its own key, then generates a digital signature certificate, and then obtains the public key from the certificate, and publishes the public key to the client.

      The way the client sends information: first, the client uses the public key to encrypt the information and sends it to the server. The server uses the key to decrypt the information, and then uses the key to encrypt it and sends it to the client. The returned information is decrypted.

A certificate is a digital signature of an entity , pointing out that the public key of other entities has a clear value .
1.
Public key : It is a digital association with a detailed entity , and is intended to be known to all other entities that want to have a trust relationship with this entity .The public key is used to verify the signature ;
2.
Digital signature : If the data has been signed and stored in an entity with an identity , a signature can prove that the entity knows the data . The data is signed and submitted with the entity's private key ;
3.
Identity : The method of knowing the entity . In some systems the identity is the public key , in other systems it can be anything from the Unix UID of an X.509 -named email address ; 4. Signature : A signature is calculated using the entity's private key Certain encrypted data ; 5. Private key :

It is some numbers , and each private key can only be known by a specific entity that owns the private key . Private and public keys exist in the key pairs of all public key encryption systems . A public key encryption ( such as DSA), a private key Communicate with a correct public key . The private key is used to calculate the signature .
6.
Entity : An entity can be a person , an organization , a program , a computer , a business , a bank , or other things you want to trust

Guess you like

Origin blog.csdn.net/caryxp/article/details/132130499