- Analytics for the Internet of Things(IoT)
- Andrew Minteer
- 185字
- 2021-07-02 18:59:40
Public/private keys
Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.
The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.
Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.
You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!
- PHP動(dòng)態(tài)網(wǎng)站程序設(shè)計(jì)
- 自制編譯器
- AngularJS Web Application Development Blueprints
- Java游戲服務(wù)器架構(gòu)實(shí)戰(zhàn)
- NumPy Essentials
- Java性能權(quán)威指南(第2版)
- MATLAB for Machine Learning
- 編程與類型系統(tǒng)
- C/C++程序員面試指南
- 輕松上手2D游戲開發(fā):Unity入門
- UI設(shè)計(jì)全書(全彩)
- 編程改變生活:用Python提升你的能力(進(jìn)階篇·微課視頻版)
- Penetration Testing with the Bash shell
- Python高性能編程(第2版)
- Improving your Penetration Testing Skills