Cryptography 8

Cryptography and cryptanalysis is about breaking and cracking passwords in order to uncover their secrets, either as encrypted plaintexts or as their private keys. A public-key approach for the latter aims to make cryptanalysis easier, more consistent, and more accessible by enabling a simple way to store and reuse a public key securely.

In theory, RSA-1024, ECDHE-RSA-4096, SHA-224, SHA384, and SHA512 are suitable for the purpose of generating and encrypting private keys, the latter being more effective as a general-purpose public key crypto technology.

It's common practice for applications to require a more secure public key for encryption and to generate one to be used in a given application. It's also common practice for developers to generate their own public keys from a variety of other public keys and/or from their own private keys. However, it's difficult to generate a public key from a random generator, so generating the key from scratch is sometimes required.

No comments:

Post a Comment