What Are the Different Encryption Techniques?
Encryption technology is the main security measure adopted by e-commerce. It is the most commonly used security method. It uses technology to transform important data into garbled (encrypted) transmission. After reaching the destination, it is restored (decrypted) by the same or different methods . The application of encryption technology is various, but the most widely used is in e-commerce and VPN, which is loved by users.
- 1. Clientless SSL: The original application of SSL. In this application, one
- The application of encryption technology is various, but the most widely used is in e-commerce and VPN, which are briefly described below.
- Application in e-commerce
- E-business requires customers to conduct various business activities online without worrying about their credit cards being stolen. In the past, in order to prevent the theft of credit card numbers, users generally order by phone and then use the user's credit card to make payments. Now people are using RSA (a public / private key) encryption technology to improve the security of credit card transactions, making it possible for e-commerce to become practical. [3]
- Many people know that NETSCAPE is a leading provider of technology in the Internet business. The company provides a technology based on RSA and secret keys that is applied to the Internet, known as the Secure Sockets Layer (SSL).
- Perhaps many people know Socket, which is a programming interface and does not provide any security measures. SSL not only provides a programming interface, but also provides a secure service. SSL 3.0 has now been applied to servers and browsers, SSL 2. 0 can only be applied on the server side.
- After SSL3.0 uses an electronic certificate to perform identity verification, the two parties can use the secret key for secure conversation. It uses both "symmetric" and "asymmetric" encryption methods. During the process of communication between the client and the e-commerce server, the client generates a Session Key, and then the client uses the server-side public key to encrypt the Session Key, and then transmits it to On the server side, after both parties know the Session Key, the transmitted data is encrypted and decrypted with the Session Key, but the public key issued by the server to the user must first apply to the relevant issuing authority to obtain the notarization.
- Based on the security guarantee provided by SSL3.0, users can freely order products and give credit card numbers, and can also exchange business information with partners on the Internet and let suppliers send orders and receipts from the Internet, which can save money. A large amount of paper saves a lot of telephone and fax costs for the company. In the past, Electronic Data Interchange (EDI), information transaction, and financial transaction were all performed on a private network. The cost of using a private network is much higher than the Internet. It is this huge temptation that has led people to develop e-commerce on the Internet, but don't forget data encryption.
- Application in VPN
- Now, more and more companies are going international. A company may have offices or sales centers in multiple countries. Each institution has its own local area network (LAN). But in today s network society, people s Not only that, users want to connect these LANs together to form a company's wide area network. This is not difficult now.
- In fact, many companies have already done so, but they generally use leased lines to connect these LANs, and they are thinking about network security. Now routers with encryption / decryption functions are everywhere, which makes it possible for people to connect to these LANs through the Internet. This is what we usually call a Virtual Private Network (VPN). When the data leaves the sender's local area network, the data is first encrypted by the user's router connected to the Internet for hardware encryption. The data is transmitted in encrypted form on the Internet. When the router reaches the destination LAN, the router will Decrypt the data so that users on the destination LAN can see the real information.