We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Information Technology - Essay Example

Comments (0)
Introduction Standards are developed for simplifying compatibility issues, as different PKI users configure and operate on different PKI infrastructures. Moreover, security will not be guaranteed, as users may incorporate vulnerable PKI resulting in security breaches and other hacking activities…
Download full paper
Information Technology Essay
Read TextPreview

Extract of sample
Information Technology

Download file to see previous pages... 2007). Similarly, the RSA cryptography standard is associated with a Public Key Cryptography Standards (PKCS) that highlights data encryption by utilizing RSA algorithm. The primary objective or reason for this standard is the construction of digital envelops and digital signatures. Moreover, the standard also defines syntax for private and publics keys of RSA. The syntax is utilized for digital certificates and the syntax for private keys is utilized for private key encryption (RSA Cryptography Standard. 2007). Public key cryptography relies on algorithms associated with asymmetric cryptography along with two incorporated keys i.e. a public key and a private key. Likewise, these two keys are separate and are utilized for decrypting and encrypting data or messages. If any user composes an electronic mail, he or she possesses a private for the email themselves. However, if the sender tries to open the email, he or she must possess a public key for accessing it. RSA public key encryption algorithm converts the private key to public key. Moreover, a signature algorithm that ensures authenticity of the sender can be incorporated with the private key without the intervention of the private key, as fundamentally it will not be possible to search two messages possessing similar signatures. The PKCS incorporates different versions such as v 2.1 standards that are associated with deploying public key cryptographic encryption along with digital signatures with appendix. Moreover, it also reflects ANS.1 syntax that illustrates keys for identifying different schemes. RSA is basically a public key algorithm that is invented by Rivest, Shamir and Adleman (Biskup) and is focused on an exponentiation module that comprises of two great prime numbers. Likewise, the security incorporated in RSA algorithm is focused on the solidity of multiplying the procedure associated with great prime numbers. Moreover, in the next version i.e. version 2.1, RSA multiprime function was incorporated. The table 1.1 shows the encryption and decryption of messages by private and public keys. Activity Keys Sending an Encrypted Message or data Utilizing the receivers public key Sending an encrypted signature Utilizing the sender’s private key Decrypting an encrypted message Utilizing the receivers private key Decrypting an encrypted signature Utilizing the sender’s public key Figure 1.1 Comparison X.509 and PGP X.509 is considered to be an ITU-T standard that is known for Public Key Infrastructure (PKI). Likewise, it specifies standardized formats associated with public key certificates and a validation algorithm for certification path. Moreover, this standard was preliminary developed in 1988 and was integrated with X.500 standard (X.509. 2007). After the integration, it was considered to be a solid hierarchical mechanism of Certificate Authorities (CA) that is responsible for issuing certificates. It is a fact that X.500 system was not completely deployed, as the IETF working group associated with public key infrastructure has acquired the standard for Internet that is considered to be a flexible environment (X.509. 2007). Besides, in the year 1998, PGP was considered to be a relatively low cost solution possessing features such as robust file, disk and email encryption suite that is based on Network ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Information Technology
The study had ranged from the planning to the implementation and training stage of IT where two principles were stressed upon. The principle of ERP and the principle of Scientific Management & Information Systems were discussed. In a critical analysis angle the various factors leading to a successful ERP were demonstrated.
9 Pages(2250 words)Essay
Information Technology Essay
Usually, attackers utilize bots as a means to contaminate huge numbers of personal computers, which eventually form a large network, which is known as a botnet (Craig 2007). Botnets are more often used by attackers to multiply viruses on networks, to hit servers and computers and even to commit various criminal acts.
4 Pages(1000 words)Essay
Driving. Information Technology Essay
An adage goes that experience is the best teacher. Driving is a routine which can teach an avid programmer how to get along with a computer system. Thus, a curious programmer should be able to observe how the four operations of the machine cycle namely, fetch, decode, store and execute relate to driving a car especially to unknown location.
4 Pages(1000 words)Essay
PHP information technology essay
Much has been written and said about the intellectual property controversies surrounding PHP. Yet, the problem of intellectual rights protection continues to persist. Despite the fact that intellectual rights controversies negatively impact the pace of open source application development in all parts of the world, the significance of open source software can hardly be ignored.
3 Pages(750 words)Essay
Laws in Canada - Information Technology Essay
CFAA deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access. Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders.
4 Pages(1000 words)Essay
Information Technology Master Essay
In fact, the structure of an organization is represented in any industry through its Information Systems, be it retailing companies, military establishments or b2b solutions. For example, in medium and big retailing companies, there are multi-tier structures, which include industrial production, wholesalers, retailers and consumers as well along with intermediate stores, which require an integrated information system.
5 Pages(1250 words)Essay
Management of information technology Essay
"Strategic information management represents a move away from conventional business thinking and practice". http://www.paconsulting.com/insights/managing_for_shareholder_value/services/entry_msv_04_strategic_information_management.htm The majority scholars might concur that we are by now well on our way through the conversion from an industrial economy to an information economy.
14 Pages(3500 words)Essay
Information Technology Essay
Its job is to use various processes to promote that particular industry. A trade association can now use the Internet to provide online training to its members. This can be offered to members who are local and those who live around the world. This can only be possible due to technology.
16 Pages(4000 words)Essay
Information Communication Technology Essay
One such invention is the advent of the Information Communication Technology (ICT)". This is actually a wide subject that covers communication apparatus and their applications. ICT covers the electronic media including televisions, radio, cell phones, internet and computer (both software and hardware aspects), the satellite system as well as all applications that are related to these machinery.
8 Pages(2000 words)Essay
Information Technology
his scenario, business intelligence tools, enterprise resource planning systems and customer relationship management systems are some of the well-known examples of these modern technologies. This part of the assignment is aimed at analyzing the role of an enterprise resource
11 Pages(2750 words)Essay
Let us find you another Essay on topic Information Technology Essay for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us