Skip to main content

Authentication in microservices | SSL | TLS | public Key | Private Key




public Kye
Private key

JWT, O Auth,

Alogorithms : RSA


Most of the end to end communication in modern days uses

public key cryptography, or public key encryption

What Does Encryption Do?
1. Sender encrypts the clear message
2. Intented recievers knows how to decrypt this scemabled message to clear text and use

When there is one key to encrypt and decrypt, like in this example where it’s a simple number of 3, it is called symmetric cryptography.

How does it work, in more simplified way,



Client ------ Server
 Server uses two key to encrypt the message but "Key-1 and Key-2)

Say
key-1 = Shift a letter by 3
key-2 = Shift a letter by 5

Public key = X
where he knows X = +3 and + 5, which only server knows

So even some knows gets the X as public key, he doesnt know , what this means,
only server knows this formula, which he dynamically created for each client and stores the formula,
like client-1 = publickey = X = +3 + 5


Handle man in the middle

with finger print authentication




Comments