Tagged articles
9 articles
Page 1 of 1
Coder Trainee
Coder Trainee
Jan 8, 2026 · Information Security

Root Certificate Rules for the Transport Department Interconnect Code

This article explains how to generate and configure the root certificate for the Transport Department’s interconnect code, detailing unique central public‑key indexing, providing the root public key to devices, adjusting generation parameters, and describing the verification flow defined in the JTT1179‑2018 specification.

JTT1179certificate generationinterconnect code
0 likes · 3 min read
Root Certificate Rules for the Transport Department Interconnect Code
Open Source Tech Hub
Open Source Tech Hub
Mar 3, 2021 · Information Security

Master SSH Key Authentication: Generate, Upload, and Use Keys Securely

This guide explains what SSH keys are, walks through the step‑by‑step process of key‑based login, shows how to generate keys with ssh‑keygen, manually add a public key to authorized_keys, and automate the upload using ssh‑copy‑id, including important security considerations.

SSHlinuxpublic key
0 likes · 10 min read
Master SSH Key Authentication: Generate, Upload, and Use Keys Securely
Open Source Linux
Open Source Linux
Jul 21, 2020 · Information Security

Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide

This article explains why traditional password and key logins are vulnerable, introduces SSH certificate authentication using a Certificate Authority, and provides detailed commands and procedures for generating CA keys, issuing server and user certificates, configuring both server and client, and revoking certificates when needed.

Certificate AuthenticationCertificate AuthoritySSH
0 likes · 12 min read
Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide
21CTO
21CTO
Nov 29, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the whimsical story of Alice, Bob, and a meddling pigeon to illustrate how HTTPS works, covering symmetric Caesar‑style ciphers, asymmetric public‑key encryption, certificate authorities, and the trade‑offs between security and performance in modern web communication.

HTTPScryptographypublic key
0 likes · 7 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Tencent Cloud Developer
Tencent Cloud Developer
Mar 6, 2018 · Blockchain

Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers

Bitcoin’s security relies on proven cryptographic principles—large‑integer public/private key pairs and digital signatures that authenticate transactions locally without exposing secret keys—making brute‑force attacks infeasible and ensuring that only implementation errors, not the mathematics, can compromise the system.

cryptographydigital signaturepublic key
0 likes · 11 min read
Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers