Nowadays, almost every business is managed and developed with the help of the internet, i.e., by using web applications. Cybercrimes have increased over time and web application hacking has become very common. This is the reason why a lot of effort is put into ensuring the security of these web applications.
Encryption of communication is an obvious security mechanism, as it protects its confidentiality when in transit. This article assumes you know the basics and the terminology for:
● Asymmetric encryption
● Symmetric encryption
● Web communication
For web applications, secure communication happens when every message is encrypted, which we call HTTPS. Figure 1 gives the schematic representation of how this happens between the server and the client.
It is clear from Figure 1 that secure communication is done by encrypting the communication using a symmetric key [KSymm]. To exchange the symmetric key between end points, asymmetric key encryption is used [KPub and KPriv]. This scheme is less likely to break, as only the server has a private key with it.
Figure 1: Basics of communication between a web application and the browser
What if a private key is compromised?
この記事は Open Source For You の September 2022 版に掲載されています。
7 日間の Magzter GOLD 無料トライアルを開始して、何千もの厳選されたプレミアム ストーリー、8,500 以上の雑誌や新聞にアクセスしてください。
すでに購読者です ? サインイン
この記事は Open Source For You の September 2022 版に掲載されています。
7 日間の Magzter GOLD 無料トライアルを開始して、何千もの厳選されたプレミアム ストーリー、8,500 以上の雑誌や新聞にアクセスしてください。
すでに購読者です? サインイン
The Crucial Role of Open Source in Advancing Blockchain Technology
Open source and blockchain technology are like soulmates, forging connections, building bridges, and working together to create a future that is more open, inclusive, and equitable.
Why Open Source Dependencies Must be Managed
Unmanaged reliance on open source software may result in a Support crisis over a project’s life span, as well as financial loss for the organisation. Planned and regular upgrades of open source software components are a must.
Why Cloud Security Alone is Not Enough for Enterprises
Traditional and off-the-shelf security tools for the cloud may lull organisations into a false sense of being safe from cyber threats. This first article in the two-part series explains why organisations must develop an enterprise cloud security governance strategy’.
Openchain: Revolutionising Supply Chain Management
Openchain’s unique features cater specifically to enhancing supply chain management. This distributed ledger technology is helping to build a future where supply chains are more transparent, efficient, and secure.
Open Source, Private and Public Blockchain Platforms: What They Offer
Open source platforms play a crucial role in driving innovation and democratising access to blockchain technology. These platforms promise to have a significant impact on the future of society by offering a range of benefits.
Why Choose Hyperledger Sawtooth?
Hyperledger Sawtooth has earned a formidable reputation as a champion of modularity in the realm of enterprise blockchains. We delve into its components and functionalities, as well as the advantages it offers businesses seeking custom-crafted blockchain solutions.
Hyperledger Fabric: What You Should Know and Why
Understanding the essential features of Hyperledger Fabric is crucial for anyone looking to develop blockchain applications for enterprise use. These features provide the foundation for building secure, scalable, and privacy-focused applications, and can be leveraged to create innovative solutions that address real-world business challenges.
The Metaverse and Blockchain Technology: What the Future Holds
The integration of the metaverse with blockchain technology has opened exciting possibilities for managing digital assets in virtual environments. As virtual worlds become increasingly immersive and interconnected, the need for secure and efficient asset management solutions has never been greater.
Machine Learning Basics for a Newbie
Machine learning is a vast and rapidly evolving field, and this article serves as a stepping stone for those new to the domain. Explore the fundamental concepts of machine learning, from understanding the differences between traditional programming and ML to delving into various types of machine learning algorithms.
Human-AI Collaboration is the Future
Al-augmented decision making is making a transformative impact across various fields, benefiting a range of industries.