Network Protocol Port Number
Network Protocol Network Protocol Protocol List Protocol List ICMP has no ports and is neither TCP nor UDP. number TCP/UDP protocol ...
Network Protocol Network Protocol Protocol List Protocol List ICMP has no ports and is neither TCP nor UDP. number TCP/UDP protocol ...
NetworkProtocol SSL/TLS Handshake NetworkProtocol SSL/TLS Handshake overall 4 SSL protocols: TLS Handshake Protocol: Phase I of Handshake Protocol: ...
HTTP Response Status Codes Overview of Status Codes 1xx Informational 100 Continue 101 Switching Protocols 2xx Successful ...
网络协议 The OSI Model Layers in OSI TCP & UDP, TCP/IP layers in TCP/IP 4. Application Layer: 3. Host-to-Host 2. Internet...
ref: https://github.com/tiangolo/fastapi/blob/master/README.md https://fastapi.tiangolo.com/tutorial/ NetworkSec - Fast API FastAPI framework, high performance, easy to learn, f...
Cipher code playfair Cipher 普莱费尔密码 Hill Cipher 希尔密码 Vigenere cipher 维吉尼亚密码 Caesar Cipher 凱撒密碼 Cipher code Classical encryption technique substitution...
[toc] PKI Public Key Infrastructure public key encryption’s major strength: ability to facilitate communication between parties previously unknown to each other. facilitate the se...
[toc] Digital certificates Basic Digital certificates electronic credentials Most commonly they contain a public key and the identity of the owner. used to assert the onl...
[toc] Digital Certificate type of Digital Certificate Certificate Attributes Four main types of certificates are used: End-entity certificates CA certificates Cross...
[toc] Digital Certificates Verification Trust and Certificate Verification When a user chooses to trust a CA download that CA’s digital certificate and public key, stored on he...
[toc] ref: Authority Registration authorities (RAs): assist Certificate authorities (CAs) RA help offload work from the CA. verify users’ identities prior to iss...
Trusted Computing basic 发展 信任是安全的基础 关键技术 Trusted Platform Module (TPMs) 安全芯片 verificat...
[toc] Hashing Algorithms Hashing: verify integrity with hashing. an algorithm performed on data to produce a number called a hash (checksum). Hash: conjunction with a message digest, ...
Cryptography - Symmetric Encryption strength weaknesses Symmetric Block Cipher / stream cipher Block Cipher Data Encryption Standard (DES...
Cryptography - SSL/TLS Encryption overall SSL/TLS vs SSH Cryptography - SSL/TLS Encryption Overall SSL/TLS uses both asymmetric and symmetric encryption to prote...