官术网_书友最值得收藏!

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.

You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!

主站蜘蛛池模板: 无锡市| 罗田县| 西峡县| 拜城县| 衡水市| 都昌县| 浦东新区| 海伦市| 肃宁县| 微博| 定日县| 昭觉县| 关岭| 潼关县| 菏泽市| 措美县| 利川市| 湘潭市| 涞水县| 东兴市| 巴马| 顺昌县| 海淀区| 依安县| 汉阴县| 章丘市| 固始县| 正宁县| 乌拉特后旗| 昆明市| 潜江市| 蓬安县| 定州市| 达拉特旗| 珠海市| 临沧市| 靖州| 冀州市| 靖远县| 无极县| 喀喇沁旗|