Tagged articles
2 articles
Page 1 of 1
21CTO
21CTO
Nov 29, 2018 · Information Security

How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys

This article uses the whimsical story of Alice, Bob, and a meddling pigeon to illustrate how HTTPS works, covering symmetric Caesar‑style ciphers, asymmetric public‑key encryption, certificate authorities, and the trade‑offs between security and performance in modern web communication.

HTTPScryptographypublic key
0 likes · 7 min read
How Carrier Pigeons Explain HTTPS: From Caesar Cipher to Public Keys
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures