July 19, 2022

Architecture of Computers and Nets

How to work cryptography symmetric and assymmetric(Pros and Cons):


  • Symmetric cryptography: Use the same key for encrypt and decrypt data, therefore your security in this method is simple and easily for broken, have a cons for facilite of to implement but is not gretter security method of cryptography.
  • Assymmetric cryptohraphy: Use the public key for encrypt and private key for decrypt data, therefore this key for decrypt and encrypt not is the same, increasing security but also increasing time for realizating it.

What are SSH Key and how to work this protocol:

  • What are SSH Key: The SSH key are authentication method used for gain acess in encrypted connection between systems and use the connection to manage remoting system 
  • How it the protocol SSH works:The SSH protocol needs some software installed on the server and on the client to establish a secure connection between two points, the system must have the SSH Daemon installed and the client must have the SSH Client installed, in this way the encrypted connection is established between these 2 points by the SSH protocol.

Content viewed

  • Article: http://www.catb.org/esr/faqs/hacker-howto.html(Inicied-EN)
  • Between diference cryptography Symmetric and Assymmetric:(Article-EN) https://blog.mailfence.com/symmetric-vs-asymmetric-encryption/#:~:text=Symmetric%20encryption%20uses%20a%20private,her%20private%20key%20to%20decrypt.
  • Symmetric vs Asymmetric Encryption(Video-EN): https://www.youtube.com/watch?v=nRou-J4YN4Y
  • Python Study Language(Video-PTBR): https://www.youtube.com/watch?v=GQpQha2Mfpg
    • HackerRank: Hello World in Python solved.(My first contact with Python)
  • What is the better S.O for coding?: https://www.youtube.com/watch?v=nkAzAZw9VT0(Video-PTBR)
  • Learning use WSL: https://www.youtube.com/watch?v=o1_E4PBl30s(Video-PTBR)
  • Study of Programming Tricks(Video - PTBR): https://www.youtube.com/watch?v=Fzwr1JcqFo4

Comentários

Postagens mais visitadas