User Tools

Site Tools


network_stuff:cryptography

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
network_stuff:cryptography [2024/10/26 16:54] jotasandokunetwork_stuff:cryptography [2024/12/19 21:25] (current) jotasandoku
Line 54: Line 54:
 In NETSCALER: In NETSCALER:
   * Citrix NetScaler VPX: Create CSR and Install SSL Certificate. [[https://www.digicert.com/csr-creation-ssl-installation-citrix-netscaler.htm#citrix_netscaler_vpx_create_csr|Link1]]   * Citrix NetScaler VPX: Create CSR and Install SSL Certificate. [[https://www.digicert.com/csr-creation-ssl-installation-citrix-netscaler.htm#citrix_netscaler_vpx_create_csr|Link1]]
-  * Install Your SSL Certificate [[https://www.digicert.com/csr-creation-ssl-installation-citrix-netscaler.htm#citrix_netscaler_vpx_ssl_certificate_install|Link2]]+  * Install Your PKI certificate [[https://www.digicert.com/csr-creation-ssl-installation-citrix-netscaler.htm#citrix_netscaler_vpx_ssl_certificate_install|Link2]]
 \\ \\
 In F5 BIG-IP: In F5 BIG-IP:
Line 130: Line 130:
 {{:rsa-formula-1.png?200|}} {{:rsa-formula-1.png?200|}}
 \\ \\
-Very succint and clear [[https://www.johndcook.com/blog/2018/12/12/rsa-exponent/|HERE!]] +Very succinct and clear [[https://www.johndcook.com/blog/2018/12/12/rsa-exponent/|HERE!]] 
-  * e, d and n very large positive integers  +Components: 
-  * Public Key Info: n,e,key-size(size in bits) :  public key encryption . n is coming from multiply to big numbers pq , e is normally 65537 + 
-  * d: private key (decryption+  * m: Your original message (converted to a number) 
-  * m : message+  * e: Public encryption exponent (usually 65537which is 2^16 + 1) 
 +  * d: Private decryption key (kept secret) 
 +  * nThe modulus (also public) 
 + 
 +  encrypted = (message ^ e) mod n 
 +  decrypted = (encrypted ^ d) mod n 
 + 
 +There's a mathematical relationship between e, d, and that makes RSA workIf someone could factor into p and qthey could calculate d using a   - formula that connects them all. To calculate d, you need to know: (which is public) 
 +  (p-1) and (q-1
 +  - p and q are like the blueprint for making copies of the key 
 +  - n being hard to factor means no one can recreate the blueprint, even though they can see the lock
  
 [[https://www.comparitech.com/blog/information-security/rsa-encryption/|Process:]] [[https://www.comparitech.com/blog/information-security/rsa-encryption/|Process:]]
Line 294: Line 304:
   update-ca-trust enable   update-ca-trust enable
   update-ca-trust   update-ca-trust
 +  
 +
 +----
 +==== CRYPTOGRAPHY IN MS WINDOWS ENVIRONMENTS ====
 +[...]
 +
 +  * SCEP facilitates the certificate enrollment and renewal of certificates.
 +  *  SCEP is normally done by the MDM device
  
network_stuff/cryptography.1729961667.txt.gz · Last modified: by jotasandoku