{"json_modified": "2016-03-28T07:59:49.425618", "uuid": "a79a2d0c-4887-455a-91aa-bf80a07c5e0f", "title": "Introduction to Public-Key Cryptography", "url": "/en-US/docs/Archive/Security/Introduction_to_Public-Key_Cryptography", "tags": ["Security", "Tutorial"], "translations": [{"uuid": "55972e71-e5cb-4ae0-9280-103527d81b72", "title": "Introduction \u00e0 la cryptographie \u00e0 clef publique", "url": "/fr/docs/Introduction_%C3%A0_la_cryptographie_%C3%A0_clef_publique", "tags": ["S\u00e9curit\u00e9"], "summary": "La cryptographie \u00e0 clef publique ainsi que les standards et les techniques qui s'y rapportent sont \u00e0 la base des dispositifs de s\u00e9curit\u00e9 de nombreux produits Red Hat. Cela comprend\u00a0: la signature et le chiffrement de messages \u00e9lectroniques, la signature de formulaire, la signature d'objet, les ouvertures de session unique et le protocole SSL (Secure Sockets Layer). Ce document est une introduction aux concepts de base de la cryptographie \u00e0 clef publique.", "localization_tags": [], "locale": "fr", "last_edit": "2015-11-16T10:11:45", "review_tags": []}, {"uuid": "f931e417-a850-4d53-8194-595445d6469a", "title": "Introduction to Public-Key Cryptography", "url": "/ja/docs/Introduction_to_Public-Key_Cryptography", "tags": ["Security"], "summary": "", "localization_tags": [], "locale": "ja", "last_edit": "2007-01-09T18:05:08", "review_tags": []}], "modified": "2015-06-04T09:36:37", "label": "Introduction to Public-Key Cryptography", "localization_tags": [], "locale": "en-US", "id": 5559, "last_edit": "2015-03-21T17:28:26", "summary": "Public-key cryptography and related standards and techniques underlie the security features of many products such as signed and encrypted email, single sign-on, and Secure Sockets Layer (SSL) communications. This document introduces the basic concepts of public-key cryptography. For an overview of SSL, see \"Introduction to SSL.\" For an overview of encryption and decryption, see \"Encryption and Decryption.\" Information on digital signatures is available from \"Digital Signatures.\"", "sections": [{"id": "Certificates_and_Authentication", "title": "Certificates and Authentication"}, {"id": "A_Certificate_Identifies_Someone_or_Something", "title": "A Certificate Identifies Someone or Something"}, {"id": "Authentication_Confirms_an_Identity", "title": "Authentication Confirms an Identity"}, {"id": "Password-Based_Authentication", "title": "Password-Based Authentication"}, {"id": "Certificate-Based_Authentication", "title": "Certificate-Based Authentication"}, {"id": "How_Certificates_Are_Used", "title": "Uses for Certificates"}, {"id": "SSL_Protocol", "title": "SSL Protocol"}, {"id": "Signed_and_Encrypted_Email", "title": "Signed and Encrypted Email"}, {"id": "Single_Sign-On", "title": "Single Sign-On"}, {"id": "Object_Signing", "title": "Object Signing"}, {"id": "Contents_of_a_Certificate", "title": "Types of Certificates"}, {"id": "Contents_of_a_Certificate_2", "title": "Contents of a Certificate"}, {"id": "Certificate_Data_Formats", "title": "Certificate Data Formats"}, {"id": "Distinguished_Names", "title": "Distinguished Names"}, {"id": "A_Typical_Certificate", "title": "A Typical Certificate"}, {"id": "How_CA_Certificates_Are_Used_to_Establish_Trust", "title": "How CA Certificates Are Used to Establish Trust"}, {"id": "CA_Hierarchies", "title": "CA Hierarchies"}, {"id": "Certificate_Chains", "title": "Certificate Chains"}, {"id": "Verifying_a_Certificate_Chain", "title": "Verifying a Certificate Chain"}, {"id": "Managing_Certificates", "title": "Managing Certificates"}, {"id": "Issuing_Certificates", "title": "Issuing Certificates"}, {"id": "Certificates_and_the_LDAP_Directory", "title": "Certificates and the LDAP Directory"}, {"id": "Key_Management", "title": "Key Management"}, {"id": "Renewing_and_Revoking_Certificates", "title": "Renewing and Revoking Certificates"}, {"id": "Registration_Authorities", "title": "Registration Authorities"}, {"id": "Original_Document_Information", "title": "Original Document Information"}], "slug": "Archive/Security/Introduction_to_Public-Key_Cryptography", "review_tags": []}