StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Report on Public Key Encryption - Assignment Example

Cite this document
Summary
Therefore, there is need to provide an identifier for online users. As a result, the public key encryption provides an identity to the world. This mainly affects those who seek to find data or information online…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Report on Public Key Encryption
Read Text Preview

Extract of sample "Report on Public Key Encryption"

Public Key Encryption The world has become electronic in almost all its activities. Therefore, there is need to provide an identifier for online users. As a result, the public key encryption provides an identity to the world. This mainly affects those who seek to find data or information online. Moreover, technology needs to be secure to avoid fraudsters from tampering with vital information. Consequently, people need a passport or identification to access online information. However, public key encryption makes use of long numbers.

These numbers are known as keys (Ferguson & Schneier, 2003 p18). The process becomes more secure when the numbers are longer. There are two keys and they include the private and public keys. For example, the smartcard and a padlock for the private and public keys, respectively. Logically, any individual can access the public keys. However, the two types of keys work together. This paper, therefore, provides a detailed report on Public Key Encryption.Alice (public key) Kevin (private key) Combined key 12345678 (shared secret between Alice and Kevin)The above diagram shows that with the keys as identity, the two can share data or information.

For example, Kevin could send Alice important data that he wants to ensure only she gets to read it. Therefore, Kevin encrypts the data with Alice’s public key since only Alice knows this public key hence she alone can encrypt the data in its original form. An individual needs to prove that he or she owns the identity when they are online. This is because the document needs to recognize the identity of the user in order to know the person (Paar & Pelzl, 2010 p152). In addition, the keys help in coding of data.

For instance, the message is applied to a publicly known mathematical hashing function that coverts the message in to a long number referred to as the hash. This is because the hash is part of the document that is signed to a user (Paar & Pelzl, 2010 p293). Consequently, when data has been scrambled using a private key, it is unscrambled using the public key. The reverse also happens when the private key is used to unscramble. This is done using another hash that is obtained from the data.AliceLarge numbers in random orderKey generate process Public key private key This diagram above shows that the two keys work together when data is scrambledIn conclusion, the public key encryption aids the protection of data or information.

Therefore, an individual signs in using a number of keys. The keys are what the data uses to check the identity of the person. As a result, the keys act as a signature of verification for online users. Bibliography Ferguson, N., & Schneier, B. (2003). Practical cryptography. Indianapolis, Ind, Wiley. Paar, C., & Pelzl, J. (2010). Understanding cryptography: a textbook for students and practitioners. Berlin, Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1623331-report-on-public-key-encryption
(Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 Words)
Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1623331-report-on-public-key-encryption.
“Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1623331-report-on-public-key-encryption.
  • Cited: 0 times

CHECK THESE SAMPLES OF Report on Public Key Encryption

Public Awareness and Human Diseases

This paper outlines the topic of public awareness and human diseases.... Diabetes mellitus (DM) comprises a group of common metabolic disorders that share the phenotype of hyperglycemia.... Several distinct types of DM exist and are caused by a complex interaction of genetics, environmental factors, and life-style choices....
8 Pages (2000 words) Report

Data Protection Issues

Avoidance: Windrush should also look into the data encryption facility offered by Oracle as a safeguarding strategy for its valuable data stored with them.... This report "Data Protection Issues" discusses threats relating to cloud computing that is falling under external threat whereas the other threats will be falling under internal threats....
1 Pages (250 words) Report

Identifying Threats and Vulnerabilities to Computer

The study "Computer Security" concerns an example of how security lapses can occur and expose the system's vulnerabilities.... This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.... hellip; Selection of protection methods, acceptance of residual risk, and implementation of controls, and monitoring effectiveness form the various stages of the risk mitigation process....
6 Pages (1500 words) Report

Operating Systems and Security

Exit"echo -n "Please select option between [1 - 8] then press [enter] key:"read optcase $opt in1) echo "************ List of all Processes running *************";ps aux | less;2) echo "*********** List of users currently logged";who | more /etc/passwd;;1.... This report "Operating Systems and Security" presents the security systems for the two file systems that are more or less similar to minor differences....
5 Pages (1250 words) Report

Public Administration

This paper ''public Administration'' tells that public philosophy is based on the concept of available service and general orientation.... nbsp; This paper will present a positive statement of public philosophy.... hellip; It will be grounded in public administration in the governance process.... nbsp; It will also consider answering the following questions: What is the public interest; How should interactions across governance structures be structured; How should human nature and beliefs be characterized....
5 Pages (1250 words) Report

Analysis of the Art Exhibit of Ken Ellis Gathering

Some of these factors are Chicago being the first and largest municipalities to require public art in various strategies and this led to the passage of the Percentage-for-Arts Ordinance in 1978, and the Art Institute of Chicago which has one of the largest and most extensive collections of impressionist and post-impressionist paintings in the world....
5 Pages (1250 words) Report

File Transfer Protocol

This report "File Transfer Protocol" presents the ability of FTP to access files from remote locations is an absolute necessity in this changing business environment.... Every other business meeting, conversations, seminars, and conference require access to data and information.... hellip; FTP account can easily be connected with iPads, tablets smartphones, and laptop devices, and all operations whether it is personal or business can easily be carried out....
12 Pages (3000 words) Report

How Public and Private Schools in Saudi Arabia Deal with Individual Differences of Students

Education management is done through nine agencies, four of which are key agencies of the government.... … The paper "How public and Private Schools in Saudi Arabia Deal with Individual Differences of Students" is a great example of a report on education.... The paper "How public and Private Schools in Saudi Arabia Deal with Individual Differences of Students" is a great example of a report on education.... public schools in Saudi Arabia are state-owned schools....
7 Pages (1750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us