{"id":15724,"date":"2026-05-22T09:24:28","date_gmt":"2026-05-22T06:24:28","guid":{"rendered":"https:\/\/www.ihs.com.tr\/blog\/?p=15724"},"modified":"2026-05-22T09:24:28","modified_gmt":"2026-05-22T06:24:28","slug":"ecdhe-eliptik-egri-anahtar-degisimi-nedir","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/","title":{"rendered":"ECDHE (Eliptik E\u011fri) Anahtar De\u011fi\u015fimi Nedir? Geleneksel RSA \u015eifrelemeye G\u00f6re Neden Daha H\u0131zl\u0131d\u0131r?"},"content":{"rendered":"<p>\u0130nternet \u00fczerinde g\u00fcvenli bir \u015fekilde gezindi\u011finizi, bankac\u0131l\u0131k i\u015flemi yapt\u0131\u011f\u0131n\u0131z\u0131 veya bir e-posta g\u00f6nderdi\u011finizi d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fczde, bu g\u00fcvenli\u011fin ard\u0131nda karma\u015f\u0131k bir \u015fifreleme s\u00fcreci yatar. Bu s\u00fcrecin en kritik ad\u0131mlar\u0131ndan biri, iki taraf\u0131n (\u00f6rne\u011fin, taray\u0131c\u0131n\u0131z ve web sunucusu) aralar\u0131nda kimsenin anlayamayaca\u011f\u0131 gizli bir oturum anahtar\u0131 olu\u015fturmas\u0131d\u0131r. Geleneksel olarak bu g\u00f6rev i\u00e7in RSA algoritmas\u0131 kullan\u0131l\u0131rken, g\u00fcn\u00fcm\u00fczde \u00e7ok daha h\u0131zl\u0131 ve g\u00fcvenli bir alternatif olan ECDHE (Elliptic Curve Diffie-Hellman Ephemeral) \u00f6ne \u00e7\u0131kmaktad\u0131r. Peki, ECDHE nedir ve onu geleneksel RSA \u015fifrelemeden \u00fcst\u00fcn k\u0131lan \u00f6zellikler nelerdir?<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7erik Tablosu<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a105e8b99013\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\" id=\"ez-toc-cssicon-toggle-item-6a105e8b99013\" aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Kriptografide-Anahtar-Degisiminin-Onemi\" >Kriptografide Anahtar De\u011fi\u015fiminin \u00d6nemi<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Simetrik-ve-Asimetrik-Sifreleme-Nedir\" >Simetrik ve Asimetrik \u015eifreleme Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Guvenli-Iletisimin-Temeli-%E2%80%9CAnahtar-Degisimi-Problemi%E2%80%9D\" >G\u00fcvenli \u0130leti\u015fimin Temeli: &#8220;Anahtar De\u011fi\u015fimi Problemi&#8221;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#TLSSSL-El-Sikismasi-Handshake-Surecindeki-Rolu\" >TLS\/SSL El S\u0131k\u0131\u015fmas\u0131 (Handshake) S\u00fcrecindeki Rol\u00fc<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Geleneksel-Yontem-RSA-Anahtar-Degisimi\" >Geleneksel Y\u00f6ntem: RSA Anahtar De\u011fi\u015fimi<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#RSA-Sifrelemesi-Nasil-Calisir\" >RSA \u015eifrelemesi Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Buyuk-Sayilarin-Carpanlara-Ayrilmasi-Problemi-Faktorizasyon\" >B\u00fcy\u00fck Say\u0131lar\u0131n \u00c7arpanlara Ayr\u0131lmas\u0131 Problemi (Fakt\u00f6rizasyon)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#RSA-Anahtar-Degisiminin-Adimlari\" >RSA Anahtar De\u011fi\u015fiminin Ad\u0131mlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#RSAnin-Performans-ve-Guvenlik-Acisindan-Sinirliliklari\" >RSA&#8217;n\u0131n Performans ve G\u00fcvenlik A\u00e7\u0131s\u0131ndan S\u0131n\u0131rl\u0131l\u0131klar\u0131<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Modern-Yaklasim-ECDHE-Anahtar-Degisimi\" >Modern Yakla\u015f\u0131m: ECDHE Anahtar De\u011fi\u015fimi<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Eliptik-Egri-Kriptografisi-ECC-Nedir\" >Eliptik E\u011fri Kriptografisi (ECC) Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Eliptik-Egri-Ayrik-Logaritma-Problemi-ECDLP\" >Eliptik E\u011fri Ayr\u0131k Logaritma Problemi (ECDLP)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#ECDH-Elliptic-Curve-Diffie-Hellman-Anahtar-Degisimi\" >ECDH (Elliptic Curve Diffie-Hellman) Anahtar De\u011fi\u015fimi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#%E2%80%9CEfemeral%E2%80%9D-Ephemeral-Kavrami-ECDHEnin-%E2%80%9CE%E2%80%9D-Anlami\" >&#8220;Efemeral&#8221; (Ephemeral) Kavram\u0131: ECDHE&#8217;nin &#8220;E&#8221; Anlam\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#ECDHE-Anahtar-Degisiminin-Adim-Adim-Isleyisi\" >ECDHE Anahtar De\u011fi\u015fiminin Ad\u0131m Ad\u0131m \u0130\u015fleyi\u015fi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Performans-ve-Guvenlik-Karsilastirmasi-ECDHE-vs-RSA\" >Performans ve G\u00fcvenlik Kar\u015f\u0131la\u015ft\u0131rmas\u0131: ECDHE vs. RSA<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Anahtar-Boyutu-ve-Guvenlik-Seviyesi-Iliskisi\" >Anahtar Boyutu ve G\u00fcvenlik Seviyesi \u0130li\u015fkisi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Hizin-Kaynagi-Neden-Daha-Kucuk-Anahtarlar-Daha-Hizlidir\" >H\u0131z\u0131n Kayna\u011f\u0131: Neden Daha K\u00fc\u00e7\u00fck Anahtarlar Daha H\u0131zl\u0131d\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Ileriye-Donuk-Gizlilik-Perfect-Forward-Secrecy-%E2%80%93-PFS-Nedir\" >\u0130leriye D\u00f6n\u00fck Gizlilik (Perfect Forward Secrecy &#8211; PFS) Nedir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#ECDHE-ile-Ileriye-Donuk-Gizliligin-Saglanmasi\" >ECDHE ile \u0130leriye D\u00f6n\u00fck Gizlili\u011fin Sa\u011flanmas\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#RSAda-Ileriye-Donuk-Gizlilik-Eksikligi\" >RSA&#8217;da \u0130leriye D\u00f6n\u00fck Gizlilik Eksikli\u011fi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#ECDHEnin-Pratik-Uygulamalari-ve-Avantajlari\" >ECDHE&#8217;nin Pratik Uygulamalar\u0131 ve Avantajlar\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Mobil-Cihazlar-ve-IoT-Ekosistemindeki-Onemi\" >Mobil Cihazlar ve IoT Ekosistemindeki \u00d6nemi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Web-Performansina-Etkisi-ve-Sayfa-Yuklenme-Hizlari\" >Web Performans\u0131na Etkisi ve Sayfa Y\u00fcklenme H\u0131zlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Modern-TLS-Surumleri-TLS-12-ve-TLS-13-ile-Uyumlulugu\" >Modern TLS S\u00fcr\u00fcmleri (TLS 1.2 ve TLS 1.3) ile Uyumlulu\u011fu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Yaygin-Tarayici-ve-Sunucu-Destegi\" >Yayg\u0131n Taray\u0131c\u0131 ve Sunucu Deste\u011fi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Guvenli-Anahtar-Degisimi-ve-SSL-Sertifikalari-Icin-Neden-IHS-Telekomu-Tercih-Etmelisiniz\" >G\u00fcvenli Anahtar De\u011fi\u015fimi ve SSL Sertifikalar\u0131 \u0130\u00e7in Neden \u0130HS Telekom&#8217;u Tercih Etmelisiniz?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Modern-Sifreleme-Algoritmalarini-Destekleyen-SSL-Cozumleri\" >Modern \u015eifreleme Algoritmalar\u0131n\u0131 Destekleyen SSL \u00c7\u00f6z\u00fcmleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Yuksek-Performansli-ve-Guvenli-Altyapi-Destegi\" >Y\u00fcksek Performansl\u0131 ve G\u00fcvenli Altyap\u0131 Deste\u011fi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Uzman-Teknik-Ekip-ile-Kurulum-ve-Yapilandirma-Danismanligi\" >Uzman Teknik Ekip ile Kurulum ve Yap\u0131land\u0131rma Dan\u0131\u015fmanl\u0131\u011f\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/www.ihs.com.tr\/blog\/ecdhe-eliptik-egri-anahtar-degisimi-nedir\/#Kesintisiz-Guvenlik-icin-Otomatik-Yenileme-ve-Yonetim-Kolayligi\" >Kesintisiz G\u00fcvenlik i\u00e7in Otomatik Yenileme ve Y\u00f6netim Kolayl\u0131\u011f\u0131<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Kriptografide-Anahtar-Degisiminin-Onemi\"><\/span>Kriptografide Anahtar De\u011fi\u015fiminin \u00d6nemi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>G\u00fcvenli dijital ileti\u015fimin temel ta\u015f\u0131, verilerin yetkisiz ki\u015filer taraf\u0131ndan anla\u015f\u0131lamayacak \u015fekilde \u015fifrelenmesidir. Bu \u015fifreleme ve de\u015fifreleme i\u015flemleri, &#8220;anahtar&#8221; ad\u0131 verilen gizli bilgilere dayan\u0131r. Ancak bu anahtarlar\u0131n g\u00fcvenli bir \u015fekilde taraflar aras\u0131nda nas\u0131l payla\u015f\u0131laca\u011f\u0131, kriptografinin en temel zorluklar\u0131ndan birini olu\u015fturur. Anahtar de\u011fi\u015fimi, bu sorunu \u00e7\u00f6zerek g\u00fcvenli bir ileti\u015fim kanal\u0131 ba\u015flatma s\u00fcrecidir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Simetrik-ve-Asimetrik-Sifreleme-Nedir\"><\/span>Simetrik ve Asimetrik \u015eifreleme Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Kriptografide iki temel \u015fifreleme y\u00f6ntemi bulunur. <b>Simetrik \u015fifrelemede<\/b>, hem \u015fifreleme hem de de\u015fifreleme i\u015flemleri i\u00e7in ayn\u0131 anahtar kullan\u0131l\u0131r. Bu y\u00f6ntem \u00e7ok h\u0131zl\u0131d\u0131r ancak anahtar\u0131n her iki tarafta da g\u00fcvenli bir \u015fekilde bulunmas\u0131 gerekir. <b>Asimetrik \u015fifrelemede<\/b> ise birbirini matematiksel olarak tamamlayan iki anahtar kullan\u0131l\u0131r: &#8220;Genel Anahtar&#8221; (Public Key) ve &#8220;\u00d6zel Anahtar&#8221; (Private Key). Genel anahtar herkesle payla\u015f\u0131labilirken, \u00f6zel anahtar kesinlikle gizli tutulmal\u0131d\u0131r. Genel anahtarla \u015fifrelenen bir veri, yaln\u0131zca e\u015fle\u015fen \u00f6zel anahtarla \u00e7\u00f6z\u00fclebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Guvenli-Iletisimin-Temeli-%E2%80%9CAnahtar-Degisimi-Problemi%E2%80%9D\"><\/span>G\u00fcvenli \u0130leti\u015fimin Temeli: &#8220;Anahtar De\u011fi\u015fimi Problemi&#8221;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Simetrik \u015fifrelemenin h\u0131z\u0131, b\u00fcy\u00fck veri ak\u0131\u015flar\u0131 i\u00e7in onu ideal k\u0131lar. Ancak iki taraf\u0131n daha \u00f6nce hi\u00e7 g\u00fcvenli bir kanalda bulu\u015fmad\u0131\u011f\u0131n\u0131 varsayal\u0131m. Birbirlerine simetrik \u015fifreleme i\u00e7in kullanacaklar\u0131 ortak anahtar\u0131 nas\u0131l g\u00f6nderecekler? Anahtar\u0131 \u015fifresiz bir kanaldan g\u00f6ndermek, aradaki herkesin onu ele ge\u00e7irmesine neden olur. \u0130\u015fte bu duruma &#8220;Anahtar De\u011fi\u015fimi Problemi&#8221; denir. Asimetrik \u015fifreleme, bu problemi \u00e7\u00f6zmek i\u00e7in kullan\u0131l\u0131r ve taraflar\u0131n g\u00fcvenli olmayan bir kanal \u00fczerinden bile ortak bir gizli anahtar olu\u015fturmas\u0131na olanak tan\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"TLSSSL-El-Sikismasi-Handshake-Surecindeki-Rolu\"><\/span>TLS\/SSL El S\u0131k\u0131\u015fmas\u0131 (Handshake) S\u00fcrecindeki Rol\u00fc<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bir web sitesine &#8220;https:\/\/&#8221; ile ba\u011fland\u0131\u011f\u0131n\u0131zda, taray\u0131c\u0131n\u0131z ve sunucu aras\u0131nda bir TLS\/SSL &#8220;el s\u0131k\u0131\u015fmas\u0131&#8221; (handshake) ger\u00e7ekle\u015fir. Bu s\u00fcrecin en \u00f6nemli amac\u0131, o oturum boyunca kullan\u0131lacak simetrik \u015fifreleme anahtarlar\u0131n\u0131 g\u00fcvenli bir \u015fekilde olu\u015fturmakt\u0131r. Anahtar de\u011fi\u015fim algoritmalar\u0131 (RSA veya ECDHE gibi), bu el s\u0131k\u0131\u015fmas\u0131n\u0131n merkezinde yer al\u0131r ve taraflar\u0131n ortak bir oturum anahtar\u0131 \u00fczerinde anla\u015fmas\u0131n\u0131 sa\u011flar. Bu anahtar olu\u015fturulduktan sonra, t\u00fcm veri al\u0131\u015fveri\u015fi bu h\u0131zl\u0131 simetrik anahtarla \u015fifrelenir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Geleneksel-Yontem-RSA-Anahtar-Degisimi\"><\/span>Geleneksel Y\u00f6ntem: RSA Anahtar De\u011fi\u015fimi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Uzun y\u0131llar boyunca internet g\u00fcvenli\u011finin temel direklerinden biri olan RSA, ad\u0131n\u0131 mucitleri Rivest, Shamir ve Adleman&#8217;dan al\u0131r. G\u00fcvenli\u011fi, b\u00fcy\u00fck tam say\u0131lar\u0131n \u00e7arpanlar\u0131na ayr\u0131lmas\u0131n\u0131n matematiksel olarak \u00e7ok zor olmas\u0131na dayanan bir asimetrik \u015fifreleme algoritmas\u0131d\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"RSA-Sifrelemesi-Nasil-Calisir\"><\/span>RSA \u015eifrelemesi Nas\u0131l \u00c7al\u0131\u015f\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>RSA&#8217;n\u0131n temel mant\u0131\u011f\u0131, iki b\u00fcy\u00fck asal say\u0131n\u0131n \u00e7arp\u0131m\u0131ndan elde edilen say\u0131y\u0131, orijinal asal \u00e7arpanlar\u0131n\u0131 bilmeden bulman\u0131n neredeyse imkans\u0131z olmas\u0131d\u0131r. Bir sunucu, genel anahtar\u0131n\u0131 (iki b\u00fcy\u00fck asal say\u0131n\u0131n \u00e7arp\u0131m\u0131ndan olu\u015fan say\u0131) herkesle payla\u015f\u0131r. \u0130stemci, bu genel anahtar\u0131 kullanarak bir mesaj\u0131 (\u00f6rne\u011fin, bir oturum anahtar\u0131) \u015fifreler. Bu \u015fifreli mesaj, yaln\u0131zca orijinal asal say\u0131lar\u0131 bilen (yani \u00f6zel anahtara sahip olan) sunucu taraf\u0131ndan \u00e7\u00f6z\u00fclebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Buyuk-Sayilarin-Carpanlara-Ayrilmasi-Problemi-Faktorizasyon\"><\/span>B\u00fcy\u00fck Say\u0131lar\u0131n \u00c7arpanlara Ayr\u0131lmas\u0131 Problemi (Fakt\u00f6rizasyon)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>RSA&#8217;n\u0131n g\u00fcvenli\u011fi, &#8220;fakt\u00f6rizasyon problemi&#8221; olarak bilinen bu matematiksel zorlu\u011fa dayan\u0131r. \u00d6rne\u011fin, 21 say\u0131s\u0131n\u0131 3 ve 7 olarak \u00e7arpanlar\u0131na ay\u0131rmak kolayd\u0131r. Ancak 2048-bit (yakla\u015f\u0131k 617 basamakl\u0131) bir say\u0131n\u0131n asal \u00e7arpanlar\u0131n\u0131 bulmak, g\u00fcn\u00fcm\u00fcz\u00fcn en g\u00fc\u00e7l\u00fc bilgisayarlar\u0131 i\u00e7in bile milyarlarca y\u0131l s\u00fcrebilir. E\u011fer bir sald\u0131rgan bu \u00e7arpanlar\u0131 bulabilirse, \u00f6zel anahtar\u0131 hesaplayabilir ve \u015fifrelenmi\u015f ileti\u015fimi \u00e7\u00f6zebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"RSA-Anahtar-Degisiminin-Adimlari\"><\/span>RSA Anahtar De\u011fi\u015fiminin Ad\u0131mlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Geleneksel bir RSA anahtar de\u011fi\u015fim s\u00fcreci genel olarak \u015fu ad\u0131mlar\u0131 izler:<\/p>\n<ul>\n<li>\u0130stemci (taray\u0131c\u0131) sunucuya ba\u011flan\u0131r ve sunucunun SSL sertifikas\u0131 ile birlikte genel anahtar\u0131n\u0131 al\u0131r.<\/li>\n<li>\u0130stemci, oturum i\u00e7in kullanaca\u011f\u0131 ge\u00e7ici bir anahtar (pre-master secret) olu\u015fturur.<\/li>\n<p> * \u0130stemci, bu ge\u00e7ici anahtar\u0131 sunucunun genel anahtar\u0131yla \u015fifreler ve sunucuya g\u00f6nderir.<\/li>\n<li>Sunucu, kendi \u00f6zel anahtar\u0131n\u0131 kullanarak bu mesaj\u0131 \u00e7\u00f6zer ve ge\u00e7ici anahtar\u0131 elde eder.<\/li>\n<li>Art\u0131k hem istemci hem de sunucu ayn\u0131 ge\u00e7ici anahtara sahiptir. Bu anahtar\u0131 kullanarak as\u0131l oturum anahtarlar\u0131n\u0131 (session keys) t\u00fcretirler ve g\u00fcvenli ileti\u015fim ba\u015flar.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"RSAnin-Performans-ve-Guvenlik-Acisindan-Sinirliliklari\"><\/span>RSA&#8217;n\u0131n Performans ve G\u00fcvenlik A\u00e7\u0131s\u0131ndan S\u0131n\u0131rl\u0131l\u0131klar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>RSA, g\u00fcvenilir bir y\u00f6ntem olmas\u0131na ra\u011fmen baz\u0131 \u00f6nemli dezavantajlara sahiptir. Bilgisayar g\u00fcc\u00fc artt\u0131k\u00e7a, RSA&#8217;n\u0131n g\u00fcvenli\u011fini korumak i\u00e7in gereken anahtar boyutlar\u0131 da h\u0131zla artmaktad\u0131r (\u00f6rne\u011fin, 1024-bit&#8217;ten 2048-bit&#8217;e ve 4096-bit&#8217;e). Bu b\u00fcy\u00fck anahtarlar, \u00f6zellikle TLS el s\u0131k\u0131\u015fmas\u0131 s\u0131ras\u0131nda ciddi bir hesaplama y\u00fck\u00fc olu\u015fturur. Bu durum, sunucu kaynaklar\u0131n\u0131 t\u00fcketir ve web sitesi y\u00fcklenme s\u00fcrelerini yava\u015flat\u0131r. Ayr\u0131ca, temel RSA anahtar de\u011fi\u015fimi, &#8220;\u0130leriye D\u00f6n\u00fck Gizlilik&#8221; (Perfect Forward Secrecy) sa\u011flamaz, bu da b\u00fcy\u00fck bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fturur.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Modern-Yaklasim-ECDHE-Anahtar-Degisimi\"><\/span>Modern Yakla\u015f\u0131m: ECDHE Anahtar De\u011fi\u015fimi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>RSA&#8217;n\u0131n performans ve g\u00fcvenlik s\u0131n\u0131rl\u0131l\u0131klar\u0131na bir \u00e7\u00f6z\u00fcm olarak Eliptik E\u011fri Kriptografisi (ECC) tabanl\u0131 anahtar de\u011fi\u015fim algoritmalar\u0131 geli\u015ftirilmi\u015ftir. ECDHE, g\u00fcn\u00fcm\u00fczde en yayg\u0131n ve g\u00fcvenli kabul edilen anahtar de\u011fi\u015fim mekanizmas\u0131d\u0131r. Hem h\u0131z hem de g\u00fcvenlik a\u00e7\u0131s\u0131ndan \u00f6nemli avantajlar sunar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Eliptik-Egri-Kriptografisi-ECC-Nedir\"><\/span>Eliptik E\u011fri Kriptografisi (ECC) Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Eliptik E\u011fri Kriptografisi (ECC), g\u00fcvenli\u011fini eliptik e\u011friler \u00fczerindeki matematiksel i\u015flemlere dayand\u0131ran bir asimetrik \u015fifreleme t\u00fcr\u00fcd\u00fcr. RSA&#8217;n\u0131n fakt\u00f6rizasyon problemine dayanmas\u0131 gibi, ECC de &#8220;Eliptik E\u011fri Ayr\u0131k Logaritma Problemi&#8221; (ECDLP) ad\u0131 verilen farkl\u0131 bir matematiksel zorlu\u011fu temel al\u0131r. Bu problemin \u00e7\u00f6z\u00fclmesi, fakt\u00f6rizasyon problemine g\u00f6re \u00e7ok daha zordur. Bu sayede, ECC \u00e7ok daha k\u00fc\u00e7\u00fck anahtar boyutlar\u0131yla RSA ile ayn\u0131 veya daha y\u00fcksek g\u00fcvenlik seviyeleri sunabilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Eliptik-Egri-Ayrik-Logaritma-Problemi-ECDLP\"><\/span>Eliptik E\u011fri Ayr\u0131k Logaritma Problemi (ECDLP)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>ECDLP&#8217;yi basit\u00e7e anlatmak gerekirse; bir eliptik e\u011fri \u00fczerinde ba\u015flang\u0131\u00e7 noktas\u0131 olan P&#8217;yi d\u00fc\u015f\u00fcn\u00fcn. Bu noktay\u0131 kendisine k defa ekleyerek Q = k*P noktas\u0131n\u0131 elde etmek kolayd\u0131r. Ancak, size sadece P ve Q noktalar\u0131 verildi\u011finde &#8220;k&#8221; de\u011ferini bulmak (ayr\u0131k logaritmay\u0131 \u00e7\u00f6zmek) matematiksel olarak son derece zordur. ECC&#8217;nin g\u00fcvenli\u011fi, bu &#8220;k&#8221; de\u011ferinin (\u00f6zel anahtar) bulunmas\u0131n\u0131n zorlu\u011funa dayan\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"ECDH-Elliptic-Curve-Diffie-Hellman-Anahtar-Degisimi\"><\/span>ECDH (Elliptic Curve Diffie-Hellman) Anahtar De\u011fi\u015fimi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>ECDH, klasik Diffie-Hellman anahtar de\u011fi\u015fim protokol\u00fcn\u00fcn eliptik e\u011fri versiyonudur. Bu protokol, iki taraf\u0131n (istemci ve sunucu) ortak bir s\u0131r (payla\u015f\u0131lan gizli anahtar) olu\u015fturmas\u0131n\u0131 sa\u011flar. Her iki taraf da kendi \u00f6zel anahtar\u0131n\u0131 ve di\u011fer taraf\u0131n genel anahtar\u0131n\u0131 kullanarak ayn\u0131 sonuca ula\u015f\u0131r, ancak bu ortak s\u0131r hi\u00e7bir zaman a\u011f \u00fczerinden g\u00f6nderilmez.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"%E2%80%9CEfemeral%E2%80%9D-Ephemeral-Kavrami-ECDHEnin-%E2%80%9CE%E2%80%9D-Anlami\"><\/span>&#8220;Efemeral&#8221; (Ephemeral) Kavram\u0131: ECDHE&#8217;nin &#8220;E&#8221; Anlam\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>ECDHE&#8217;deki &#8220;E&#8221; harfi, &#8220;Ephemeral&#8221; (ge\u00e7ici, tek kullan\u0131ml\u0131k) anlam\u0131na gelir ve bu algoritman\u0131n en \u00f6nemli g\u00fcvenlik \u00f6zelli\u011fini temsil eder. Klasik ECDH&#8217;de, sunucu her zaman ayn\u0131 \u00f6zel anahtar\u0131 kullanabilir. Ancak ECDHE&#8217;de, her bir TLS el s\u0131k\u0131\u015fmas\u0131 i\u00e7in hem istemci hem de sunucu tamamen yeni, ge\u00e7ici bir eliptik e\u011fri anahtar \u00e7ifti olu\u015fturur. Bu anahtarlar sadece o oturum i\u00e7in kullan\u0131l\u0131r ve oturum bitti\u011finde imha edilir. Bu yakla\u015f\u0131m, &#8220;\u0130leriye D\u00f6n\u00fck Gizlilik&#8221; (Perfect Forward Secrecy) sa\u011flar.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"ECDHE-Anahtar-Degisiminin-Adim-Adim-Isleyisi\"><\/span>ECDHE Anahtar De\u011fi\u015fiminin Ad\u0131m Ad\u0131m \u0130\u015fleyi\u015fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Bir ECDHE anahtar de\u011fi\u015fimi s\u00fcreci \u015fu \u015fekilde i\u015fler:<\/p>\n<ul>\n<li>\u0130stemci, destekledi\u011fi \u015fifreleme paketlerini ve kendi ge\u00e7ici ECDH genel anahtar\u0131n\u0131 sunucuya g\u00f6nderir.<\/li>\n<li>Sunucu, istemcinin parametrelerini kullanarak kendi ge\u00e7ici ECDH anahtar \u00e7iftini olu\u015fturur.<\/li>\n<li>Sunucu, kendi ge\u00e7ici ECDH genel anahtar\u0131n\u0131 ve <a href=\"https:\/\/www.ihs.com.tr\/ssl\/\" target=\"_blank\">SSL sertifikas\u0131<\/a> gibi di\u011fer bilgileri istemciye g\u00f6nderir. Sunucu, bu mesaj\u0131 kendi uzun vadeli \u00f6zel anahtar\u0131yla (\u00f6rne\u011fin RSA veya ECDSA) dijital olarak imzalayarak kimli\u011fini do\u011frular.<\/li>\n<li>\u0130stemci, sunucunun imzas\u0131n\u0131 do\u011frular. Art\u0131k her iki taraf da birbirinin ge\u00e7ici genel anahtar\u0131na ve kendi ge\u00e7ici \u00f6zel anahtar\u0131na sahiptir.<\/li>\n<li>Her iki taraf da kendi ge\u00e7ici \u00f6zel anahtar\u0131n\u0131 ve di\u011fer taraf\u0131n ge\u00e7ici genel anahtar\u0131n\u0131 kullanarak ayn\u0131 payla\u015f\u0131lan gizli anahtar\u0131 (pre-master secret) ba\u011f\u0131ms\u0131z olarak hesaplar.<\/li>\n<li>Bu payla\u015f\u0131lan s\u0131rdan oturum anahtarlar\u0131 t\u00fcretilir ve \u015fifreli ileti\u015fim ba\u015flar.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Performans-ve-Guvenlik-Karsilastirmasi-ECDHE-vs-RSA\"><\/span>Performans ve G\u00fcvenlik Kar\u015f\u0131la\u015ft\u0131rmas\u0131: ECDHE vs. RSA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ECDHE&#8217;nin RSA&#8217;ya g\u00f6re neden tercih edildi\u011fini anlamak i\u00e7in performans ve g\u00fcvenlik metriklerini do\u011frudan kar\u015f\u0131la\u015ft\u0131rmak en iyi yoldur. Modern internet altyap\u0131s\u0131n\u0131n h\u0131z ve g\u00fcvenlik beklentilerini kar\u015f\u0131lamada ECDHE&#8217;nin sundu\u011fu avantajlar olduk\u00e7a belirgindir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Anahtar-Boyutu-ve-Guvenlik-Seviyesi-Iliskisi\"><\/span>Anahtar Boyutu ve G\u00fcvenlik Seviyesi \u0130li\u015fkisi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Kriptografide g\u00fcvenlik seviyesi &#8220;bit&#8221; cinsinden ifade edilir. \u00d6rne\u011fin, 128-bit g\u00fcvenlik, bir anahtar\u0131 kaba kuvvet sald\u0131r\u0131s\u0131yla k\u0131rman\u0131n 2\u00b9\u00b2\u2078 i\u015flem gerektirdi\u011fi anlam\u0131na gelir. ECC&#8217;nin en b\u00fcy\u00fck avantaj\u0131, \u00e7ok daha k\u00fc\u00e7\u00fck anahtar boyutlar\u0131yla e\u015fde\u011fer g\u00fcvenlik seviyeleri sunabilmesidir.<\/p>\n<h4>RSA Anahtar Boyutlar\u0131 (2048-bit, 4096-bit)<\/h4>\n<p>G\u00fcn\u00fcm\u00fczde g\u00fcvenli kabul edilen minimum RSA anahtar boyutu 2048-bit&#8217;tir. Bu, yakla\u015f\u0131k 112-bit simetrik g\u00fcvenlik seviyesine denk gelir. Daha y\u00fcksek g\u00fcvenlik i\u00e7in ise 4096-bit anahtarlar kullan\u0131l\u0131r. Bu anahtarlar olduk\u00e7a b\u00fcy\u00fckt\u00fcr ve i\u015flenmesi yo\u011fun kaynak gerektirir.<\/p>\n<h4>ECC Anahtar Boyutlar\u0131 (256-bit, 384-bit)<\/h4>\n<p>Buna kar\u015f\u0131l\u0131k, 256-bit&#8217;lik bir ECC anahtar\u0131, 3072-bit&#8217;lik bir RSA anahtar\u0131na e\u015fde\u011fer bir g\u00fcvenlik (yakla\u015f\u0131k 128-bit) sa\u011flar. 384-bit&#8217;lik bir ECC anahtar\u0131 ise 7680-bit&#8217;lik bir RSA anahtar\u0131na denk gelen \u00e7ok daha y\u00fcksek bir g\u00fcvenlik sunar. Bu, devasa bir boyut fark\u0131 anlam\u0131na gelir.<\/p>\n<div class=\"karsilastirma\">\n<table>\n<thead>\n<tr>\n<th>Simetrik G\u00fcvenlik Seviyesi<\/th>\n<th>ECC Anahtar Boyutu<\/th>\n<th>RSA Anahtar Boyutu<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>80 bit<\/td>\n<td>160 bit<\/td>\n<td>1024 bit<\/td>\n<\/tr>\n<tr>\n<td>112 bit<\/td>\n<td>224 bit<\/td>\n<td>2048 bit<\/td>\n<\/tr>\n<tr>\n<td>128 bit<\/td>\n<td>256 bit<\/td>\n<td>3072 bit<\/td>\n<\/tr>\n<tr>\n<td>192 bit<\/td>\n<td>384 bit<\/td>\n<td>7680 bit<\/td>\n<\/tr>\n<tr>\n<td>256 bit<\/td>\n<td>512 bit<\/td>\n<td>15360 bit<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"Hizin-Kaynagi-Neden-Daha-Kucuk-Anahtarlar-Daha-Hizlidir\"><\/span>H\u0131z\u0131n Kayna\u011f\u0131: Neden Daha K\u00fc\u00e7\u00fck Anahtarlar Daha H\u0131zl\u0131d\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Anahtar boyutundaki bu dramatik fark, do\u011frudan performansa yans\u0131r. ECDHE&#8217;nin RSA&#8217;dan daha h\u0131zl\u0131 olmas\u0131n\u0131n iki temel nedeni vard\u0131r: daha az hesaplama karma\u015f\u0131kl\u0131\u011f\u0131 ve a\u011f \u00fczerinde daha az veri transferi.<\/p>\n<h4>Hesaplama Karma\u015f\u0131kl\u0131\u011f\u0131 ve \u0130\u015flemci Y\u00fck\u00fc<\/h4>\n<p>Eliptik e\u011fri matemati\u011fi, RSA&#8217;n\u0131n gerektirdi\u011fi \u00fcs alma i\u015flemlerine g\u00f6re \u00e7ok daha verimlidir. \u00d6zellikle TLS el s\u0131k\u0131\u015fmas\u0131 s\u0131ras\u0131nda sunucunun yapmas\u0131 gereken \u00f6zel anahtar i\u015flemi, ECDHE&#8217;de RSA&#8217;ya g\u00f6re \u00e7ok daha az i\u015flemci (CPU) g\u00fcc\u00fc gerektirir. Bu, \u00f6zellikle y\u00fcksek trafikli web siteleri i\u00e7in sunucu y\u00fck\u00fcn\u00fc \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r ve daha fazla e\u015fzamanl\u0131 ba\u011flant\u0131y\u0131 y\u00f6netme kapasitesi sa\u011flar.<\/p>\n<h4>A\u011f \u00dczerinde \u0130letilen Veri Miktar\u0131<\/h4>\n<p>Daha k\u00fc\u00e7\u00fck anahtar boyutlar\u0131, el s\u0131k\u0131\u015fmas\u0131 s\u0131ras\u0131nda istemci ve sunucu aras\u0131nda g\u00f6nderilip al\u0131nan veri miktar\u0131n\u0131n da daha az olmas\u0131 anlam\u0131na gelir. Sertifikalar ve anahtar de\u011fi\u015fim mesajlar\u0131 daha k\u00fc\u00e7\u00fckt\u00fcr. Bu durum, \u00f6zellikle gecikme s\u00fcresinin y\u00fcksek oldu\u011fu mobil a\u011flarda veya yava\u015f internet ba\u011flant\u0131lar\u0131nda sayfa y\u00fcklenme s\u00fcrelerini k\u0131salt\u0131r ve kullan\u0131c\u0131 deneyimini iyile\u015ftirir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Ileriye-Donuk-Gizlilik-Perfect-Forward-Secrecy-%E2%80%93-PFS-Nedir\"><\/span>\u0130leriye D\u00f6n\u00fck Gizlilik (Perfect Forward Secrecy &#8211; PFS) Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>\u0130leriye D\u00f6n\u00fck Gizlilik (PFS), bir sistemin uzun vadeli \u00f6zel anahtar\u0131n\u0131n \u00e7al\u0131nmas\u0131 durumunda bile ge\u00e7mi\u015f oturumlar\u0131n gizlili\u011finin korunmas\u0131n\u0131 sa\u011flayan bir g\u00fcvenlik \u00f6zelli\u011fidir. E\u011fer bir sald\u0131rgan, bir sunucunun \u00f6zel anahtar\u0131n\u0131 ele ge\u00e7irirse, PFS olmadan bu sunucu \u00fczerinden ge\u00e7mi\u015fte yap\u0131lm\u0131\u015f ve kaydedilmi\u015f t\u00fcm \u015fifreli trafi\u011fi \u00e7\u00f6zebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"ECDHE-ile-Ileriye-Donuk-Gizliligin-Saglanmasi\"><\/span>ECDHE ile \u0130leriye D\u00f6n\u00fck Gizlili\u011fin Sa\u011flanmas\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>ECDHE, do\u011fas\u0131 gere\u011fi PFS sa\u011flar. \u00c7\u00fcnk\u00fc her oturum i\u00e7in yeni ve ge\u00e7ici (ephemeral) bir anahtar \u00e7ifti olu\u015fturulur. Oturum sona erdi\u011finde bu ge\u00e7ici anahtarlar yok edilir. Dolay\u0131s\u0131yla, sunucunun uzun vadeli \u00f6zel anahtar\u0131 (imzalama i\u00e7in kullan\u0131lan) \u00e7al\u0131nsa bile, bu anahtar ge\u00e7mi\u015f oturumlar\u0131n anahtarlar\u0131n\u0131 t\u00fcretmek i\u00e7in kullan\u0131lamaz. Her oturumun g\u00fcvenli\u011fi kendi \u00f6zel anahtarlar\u0131na ba\u011fl\u0131d\u0131r ve birbirinden tamamen ba\u011f\u0131ms\u0131zd\u0131r.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"RSAda-Ileriye-Donuk-Gizlilik-Eksikligi\"><\/span>RSA&#8217;da \u0130leriye D\u00f6n\u00fck Gizlilik Eksikli\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Geleneksel RSA anahtar de\u011fi\u015fiminde, istemci oturum anahtar\u0131n\u0131 do\u011frudan sunucunun uzun vadeli genel anahtar\u0131yla \u015fifreler. Bu, e\u011fer sunucunun \u00f6zel anahtar\u0131 bir g\u00fcn ele ge\u00e7irilirse, o anahtarla ge\u00e7mi\u015fte \u015fifrelenmi\u015f ve kaydedilmi\u015f t\u00fcm oturumlar\u0131n de\u015fifre edilebilece\u011fi anlam\u0131na gelir. Bu nedenle, PFS \u00f6zelli\u011fi sunmayan standart RSA anahtar de\u011fi\u015fimi art\u0131k modern g\u00fcvenlik standartlar\u0131 i\u00e7in yetersiz kabul edilmektedir.<\/p>\n<div class=\"karsilastirma\">\n<table>\n<thead>\n<tr>\n<th>\u00d6zellik<\/th>\n<th>ECDHE Anahtar De\u011fi\u015fimi<\/th>\n<th>Geleneksel RSA Anahtar De\u011fi\u015fimi<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><b>Temel Matematiksel Problem<\/b><\/td>\n<td>Eliptik E\u011fri Ayr\u0131k Logaritma (ECDLP)<\/td>\n<td>\u00c7arpanlara Ay\u0131rma (Fakt\u00f6rizasyon)<\/td>\n<\/tr>\n<tr>\n<td><b>Anahtar Boyutu (Benzer G\u00fcvenlik)<\/b><\/td>\n<td>\u00c7ok daha k\u00fc\u00e7\u00fck (\u00f6rn: 256-bit)<\/td>\n<td>\u00c7ok daha b\u00fcy\u00fck (\u00f6rn: 2048\/3072-bit)<\/td>\n<\/tr>\n<tr>\n<td><b>Performans (CPU Y\u00fck\u00fc)<\/b><\/td>\n<td>D\u00fc\u015f\u00fck, h\u0131zl\u0131<\/td>\n<td>Y\u00fcksek, yava\u015f<\/td>\n<\/tr>\n<tr>\n<td><b>\u0130leriye D\u00f6n\u00fck Gizlilik (PFS)<\/b><\/td>\n<td>Evet (Do\u011fal olarak sa\u011flar)<\/td>\n<td>Hay\u0131r (Varsay\u0131lan olarak sa\u011flamaz)<\/td>\n<\/tr>\n<tr>\n<td><b>A\u011f Veri Kullan\u0131m\u0131<\/b><\/td>\n<td>Daha az<\/td>\n<td>Daha fazla<\/td>\n<\/tr>\n<tr>\n<td><b>Modern Uygulamalar<\/b><\/td>\n<td>Mobil, IoT, Modern Web (Standart)<\/td>\n<td>Eski sistemler, Geriye uyumluluk<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"ECDHEnin-Pratik-Uygulamalari-ve-Avantajlari\"><\/span>ECDHE&#8217;nin Pratik Uygulamalar\u0131 ve Avantajlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ECDHE&#8217;nin teorik \u00fcst\u00fcnl\u00fckleri, g\u00fcn\u00fcm\u00fcz dijital d\u00fcnyas\u0131nda somut faydalara d\u00f6n\u00fc\u015fmektedir. H\u0131z, g\u00fcvenlik ve verimlilik kombinasyonu, onu modern internetin vazge\u00e7ilmez bir par\u00e7as\u0131 haline getirmi\u015ftir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Mobil-Cihazlar-ve-IoT-Ekosistemindeki-Onemi\"><\/span>Mobil Cihazlar ve IoT Ekosistemindeki \u00d6nemi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ak\u0131ll\u0131 telefonlar, tabletler ve Nesnelerin \u0130nterneti (IoT) cihazlar\u0131 gibi i\u015flem g\u00fcc\u00fc s\u0131n\u0131rl\u0131 olan platformlar i\u00e7in ECDHE idealdir. D\u00fc\u015f\u00fck i\u015flemci y\u00fck\u00fc, bu cihazlar\u0131n pillerini daha az t\u00fcketerek ve i\u015flemcilerini yormadan g\u00fcvenli ba\u011flant\u0131lar kurmas\u0131n\u0131 sa\u011flar. RSA&#8217;n\u0131n y\u00fcksek hesaplama maliyeti, bu t\u00fcr cihazlar i\u00e7in ciddi bir performans darbo\u011faz\u0131 olu\u015fturabilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Web-Performansina-Etkisi-ve-Sayfa-Yuklenme-Hizlari\"><\/span>Web Performans\u0131na Etkisi ve Sayfa Y\u00fcklenme H\u0131zlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Web performans\u0131, kullan\u0131c\u0131 deneyimi ve SEO i\u00e7in kritik bir fakt\u00f6rd\u00fcr. ECDHE, TLS el s\u0131k\u0131\u015fma s\u00fcresini milisaniyeler d\u00fczeyinde k\u0131salt\u0131r. Bu, \u00f6zellikle i\u00e7eri\u011fin h\u0131zl\u0131 y\u00fcklenmesinin beklendi\u011fi e-ticaret siteleri, haber portallar\u0131 ve uygulamalar i\u00e7in \u00f6nemlidir. Daha h\u0131zl\u0131 bir el s\u0131k\u0131\u015fma, sayfan\u0131n daha h\u0131zl\u0131 y\u00fcklenmeye ba\u015flamas\u0131 ve kullan\u0131c\u0131lar\u0131n siteyle daha \u00e7abuk etkile\u015fime girmesi anlam\u0131na gelir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Modern-TLS-Surumleri-TLS-12-ve-TLS-13-ile-Uyumlulugu\"><\/span>Modern TLS S\u00fcr\u00fcmleri (TLS 1.2 ve TLS 1.3) ile Uyumlulu\u011fu<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>ECDHE, modern g\u00fcvenlik protokolleri olan TLS 1.2 ve \u00f6zellikle TLS 1.3&#8217;\u00fcn temel bir bile\u015fenidir. Asl\u0131nda, en son standart olan TLS 1.3, PFS sa\u011flamayan RSA anahtar de\u011fi\u015fimi gibi eski algoritmalar\u0131 tamamen kald\u0131rm\u0131\u015ft\u0131r. Bu da internetin gelece\u011finin ECDHE gibi PFS \u00f6zellikli \u015fifreleme paketlerine dayand\u0131\u011f\u0131n\u0131 g\u00f6stermektedir. G\u00fcvenli ve modern bir web altyap\u0131s\u0131 i\u00e7in ECDHE kullan\u0131m\u0131 art\u0131k bir se\u00e7enek de\u011fil, bir zorunluluktur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Yaygin-Tarayici-ve-Sunucu-Destegi\"><\/span>Yayg\u0131n Taray\u0131c\u0131 ve Sunucu Deste\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>G\u00fcn\u00fcm\u00fczde Chrome, Firefox, Safari ve Edge gibi t\u00fcm modern web taray\u0131c\u0131lar\u0131 ECDHE&#8217;yi tam olarak desteklemekte ve \u00f6nceliklendirmektedir. Benzer \u015fekilde, Apache, Nginx ve IIS gibi pop\u00fcler web sunucular\u0131 da ECDHE \u015fifreleme paketlerini desteklemek i\u00e7in kolayca yap\u0131land\u0131r\u0131labilir. Bu yayg\u0131n destek, ECDHE&#8217;nin internet genelinde standart haline gelmesini sa\u011flam\u0131\u015ft\u0131r. Bir web sitesinin hem <a href=\"https:\/\/www.ihs.com.tr\/web-hosting\/windows-hosting.html\" target=\"_blank\">Windows hosting<\/a> hem de <a href=\"https:\/\/www.ihs.com.tr\/web-hosting\/linux-hosting.html\" target=\"_blank\">Linux hosting<\/a> platformlar\u0131nda modern \u015fifreleme standartlar\u0131n\u0131 desteklemesi, g\u00fcvenlik ve performans a\u00e7\u0131s\u0131ndan kritik \u00f6neme sahiptir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Guvenli-Anahtar-Degisimi-ve-SSL-Sertifikalari-Icin-Neden-IHS-Telekomu-Tercih-Etmelisiniz\"><\/span>G\u00fcvenli Anahtar De\u011fi\u015fimi ve SSL Sertifikalar\u0131 \u0130\u00e7in Neden \u0130HS Telekom&#8217;u Tercih Etmelisiniz?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Web sitenizin g\u00fcvenli\u011fi, sadece bir <a href=\"https:\/\/www.ihs.com.tr\/ssl-sertifikasi-fiyatlari.html\" target=\"_blank\">SSL sertifikas\u0131<\/a> kurmaktan daha fazlas\u0131n\u0131 gerektirir. Kulland\u0131\u011f\u0131n\u0131z \u015fifreleme algoritmalar\u0131, anahtar de\u011fi\u015fim mekanizmalar\u0131 ve sunucu yap\u0131land\u0131rmas\u0131, ziyaret\u00e7ilerinizin verilerini korumada ve sitenizin performans\u0131n\u0131 optimize etmede hayati bir rol oynar. \u0130HS Telekom olarak, en g\u00fcncel ve g\u00fcvenli teknolojileri sunarak dijital varl\u0131klar\u0131n\u0131z\u0131 en \u00fcst d\u00fczeyde koruman\u0131za yard\u0131mc\u0131 oluyoruz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Modern-Sifreleme-Algoritmalarini-Destekleyen-SSL-Cozumleri\"><\/span>Modern \u015eifreleme Algoritmalar\u0131n\u0131 Destekleyen SSL \u00c7\u00f6z\u00fcmleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>\u0130HS Telekom, ECDHE gibi modern, h\u0131zl\u0131 ve g\u00fcvenli anahtar de\u011fi\u015fim algoritmalar\u0131n\u0131 destekleyen SSL sertifikas\u0131 \u00e7\u00f6z\u00fcmleri sunar. Altyap\u0131m\u0131z, TLS 1.2 ve TLS 1.3 gibi en g\u00fcncel protokollerle tam uyumlu \u00e7al\u0131\u015farak sitenizin hem g\u00fcvenli hem de performansl\u0131 olmas\u0131n\u0131 sa\u011flar. \u0130ster basit bir blog i\u00e7in, isterse kapsaml\u0131 bir <a href=\"https:\/\/www.ihs.com.tr\/web-hosting\/wordpress-hosting.html\" target=\"_blank\">wordpress hosting<\/a> altyap\u0131s\u0131 i\u00e7in olsun, en do\u011fru g\u00fcvenlik yap\u0131land\u0131rmas\u0131n\u0131 sunuyoruz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Yuksek-Performansli-ve-Guvenli-Altyapi-Destegi\"><\/span>Y\u00fcksek Performansl\u0131 ve G\u00fcvenli Altyap\u0131 Deste\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Sundu\u011fumuz <a href=\"https:\/\/www.ihs.com.tr\/web-hosting\/\" target=\"_blank\">hosting<\/a> hizmetleri, ECDHE&#8217;nin getirdi\u011fi performans avantajlar\u0131ndan tam olarak yararlanacak \u015fekilde optimize edilmi\u015ftir. G\u00fc\u00e7l\u00fc bir <a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/\" target=\"_blank\">sunucu<\/a> altyap\u0131s\u0131, \u015fifreleme i\u015flemlerinin web sitenizi yava\u015flatmas\u0131n\u0131 engeller. \u0130htiya\u00e7lar\u0131n\u0131za g\u00f6re \u00f6l\u00e7eklenebilen <a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/vps-server.html\" target=\"_blank\">VPS<\/a> veya <a href=\"https:\/\/www.ihs.com.tr\/sunucu-kiralama\/vds-sunucu.html\" target=\"_blank\">VDS<\/a> \u00e7\u00f6z\u00fcmlerimizle, en yo\u011fun trafikte bile sitenizin h\u0131zl\u0131 ve eri\u015filebilir kalmas\u0131n\u0131 garanti ederiz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Uzman-Teknik-Ekip-ile-Kurulum-ve-Yapilandirma-Danismanligi\"><\/span>Uzman Teknik Ekip ile Kurulum ve Yap\u0131land\u0131rma Dan\u0131\u015fmanl\u0131\u011f\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Do\u011fru SSL sertifikas\u0131n\u0131 se\u00e7mek ve sunucunuzu en g\u00fcvenli \u015fekilde yap\u0131land\u0131rmak teknik bilgi gerektirebilir. \u0130HS Telekom&#8217;un uzman teknik ekibi, <a href=\"https:\/\/www.ihs.com.tr\/domain\/alan-adi-domain-tescili.html\" target=\"_blank\">alan ad\u0131<\/a> kayd\u0131ndan SSL kurulumuna kadar her ad\u0131mda size destek olur. Sunucunuzun en g\u00fcncel \u015fifreleme paketlerini kullanacak \u015fekilde yap\u0131land\u0131r\u0131lmas\u0131 ve g\u00fcvenlik zafiyetlerinin ortadan kald\u0131r\u0131lmas\u0131 i\u00e7in profesyonel dan\u0131\u015fmanl\u0131k hizmeti sunuyoruz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Kesintisiz-Guvenlik-icin-Otomatik-Yenileme-ve-Yonetim-Kolayligi\"><\/span>Kesintisiz G\u00fcvenlik i\u00e7in Otomatik Yenileme ve Y\u00f6netim Kolayl\u0131\u011f\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SSL sertifikalar\u0131n\u0131n s\u00fcresinin dolmas\u0131, sitenizin g\u00fcvenli olmayan olarak i\u015faretlenmesine ve ziyaret\u00e7i kaybetmenize neden olabilir. \u0130HS Telekom, otomatik yenileme \u00f6zellikleri ve kullan\u0131c\u0131 dostu y\u00f6netim paneli ile sertifika y\u00f6netimi s\u00fcrecini basitle\u015ftirir. Bu sayede web sitenizin g\u00fcvenli\u011fi hi\u00e7bir zaman kesintiye u\u011framaz ve siz de i\u015finize odaklanabilirsiniz. G\u00fcvenli\u011finizi ve performans\u0131n\u0131z\u0131 \u015fansa b\u0131rakmay\u0131n, \u0130HS Telekom&#8217;un modern \u00e7\u00f6z\u00fcmleriyle tan\u0131\u015f\u0131n.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130nternet \u00fczerinde g\u00fcvenli bir \u015fekilde gezindi\u011finizi, bankac\u0131l\u0131k i\u015flemi yapt\u0131\u011f\u0131n\u0131z\u0131 veya bir e-posta g\u00f6nderdi\u011finizi d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fczde, bu g\u00fcvenli\u011fin ard\u0131nda karma\u015f\u0131k bir \u015fifreleme s\u00fcreci yatar.&hellip;<\/p>\n","protected":false},"author":3,"featured_media":15725,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[400],"tags":[],"class_list":["post-15724","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ssl-sertifikasi"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=15724"}],"version-history":[{"count":1,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15724\/revisions"}],"predecessor-version":[{"id":15726,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/15724\/revisions\/15726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/15725"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=15724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=15724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=15724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}