官术网_书友最值得收藏!

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.

You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!

主站蜘蛛池模板: 安乡县| 灌阳县| 宁阳县| 子洲县| 天柱县| 临沂市| 灵武市| 自治县| 色达县| 永城市| 运城市| 什邡市| 利辛县| 陵川县| 巩义市| 饶阳县| 石城县| 灵山县| 炉霍县| 环江| 洛宁县| 宁阳县| 天柱县| 石景山区| 宁津县| 曲松县| 福清市| 阿克陶县| 巍山| 阿合奇县| 北川| 昭通市| 旅游| 镇宁| 三台县| 东兴市| 金溪县| 泰顺县| 屏东县| 高陵县| 厦门市|