官术网_书友最值得收藏!

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.

You will use the public/private keys often for IoT analytics when you build secure processes. Think of it like a username and password for your analytics, but better. Cryptography is a fascinating subject (for some of us at least); read up on it for more details. Otherwise, take it on faith that it is all good - it is!

主站蜘蛛池模板: 武乡县| 宁德市| 昭通市| 吴桥县| 正宁县| 桃江县| 岐山县| 周口市| 安新县| 淮阳县| 房产| 宣恩县| 江阴市| 叶城县| 三门峡市| 太湖县| 龙州县| 稻城县| 栾城县| 祁东县| 揭西县| 定安县| 新建县| 芦溪县| 永善县| 景洪市| 会东县| 宜宾县| 阜康市| 高阳县| 康保县| 额尔古纳市| 略阳县| 赤水市| 天全县| 夏津县| 平湖市| 中江县| 浦城县| 临汾市| 大英县|