官术网_书友最值得收藏!

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.

You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!

主站蜘蛛池模板: 辽中县| 许昌市| 如皋市| 定安县| 钦州市| 肇州县| 志丹县| 宣恩县| 太仓市| 民县| 屯门区| 闽清县| 托克逊县| 承德市| 广元市| 高淳县| 玛曲县| 玛纳斯县| 永春县| 辽宁省| 许昌县| 靖边县| 武清区| 炉霍县| 抚宁县| 阳山县| 勐海县| 徐汇区| 绥德县| 阜新| 息烽县| 龙里县| 县级市| 阿合奇县| 奉新县| 巨野县| 五寨县| 阿鲁科尔沁旗| 乐至县| 武穴市| 灵石县|