Kaigai Blog living abroad in my twenties

【Lecture12】Computer Systems & Networks

Infotech Networking

Cryptography

  • Public Key Cryptography
  • Secret Key Cryptography
  • Hash Functions

Secret Key Cryptography

Public Key Cryptography


Source: Practical Networking

確かにmoduloを使ったらハックするのはほぼ不可能だよね

You can know how digital certificate is important

About cryptography

Hash

匿名のアルゴリズムに従って解読不可能の暗号を作るもの。

Example

Hello
→185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
hello
→2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824

上の例のように、大文字小文字の違いたけでも全く違う暗号が作られる。(with some certain amount of bits, If that was SHA256, which means it produces the hash by 256 bits)
» SHA256