- Analytics for the Internet of Things(IoT)
- Andrew Minteer
- 185字
- 2021-07-02 18:59:40
Public/private keys
Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.
The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.
Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.
You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!
- Mastering JavaScript Functional Programming
- Intel Galileo Essentials
- 從零開始:數(shù)字圖像處理的編程基礎(chǔ)與應(yīng)用
- JavaScript:Functional Programming for JavaScript Developers
- 程序員面試算法寶典
- 單片機(jī)應(yīng)用與調(diào)試項(xiàng)目教程(C語言版)
- SQL經(jīng)典實(shí)例(第2版)
- 輕松上手2D游戲開發(fā):Unity入門
- GameMaker Essentials
- 深入淺出Go語言編程
- 鴻蒙OS應(yīng)用編程實(shí)戰(zhàn)
- Learning Android Application Testing
- Expert Cube Development with SSAS Multidimensional Models
- Learning GraphQL and Relay
- Java編程動(dòng)手學(xué)