StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Mathematical Focus on RSA Public & Private Key encryption - Research Paper Example

Cite this document
Summary
A digital signature is a mathematical scheme that consists of three parts, namely a key generation signing algorithm, a signing algorithm and a signature verifying algorithm, and they are used in e-commerce.
In the United States of America, and the European Union, there are…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful

Extract of sample "Mathematical Focus on RSA Public & Private Key encryption"

Download file to see previous pages

ted States code gives a definition of an electronic signature as a sound, symbol, process that emanates from an electronic means, with the purpose of sealing a contract, or an agreement, and adopted by an individual with the intention of signing the record. One of the laws guiding the operations of digital signature in America is the Uniform Electronic Transactions Act of 1999 (Batten, 35). This act adopts the definition of a digital signature in relation to the stand taken by the American Code.

Another American law regulating the use of a digital signature is the U.S. Electronic Signature in Global and National Commerce act of 2000. This law regulates the use of electronic data and signatures in relation to foreign trade and interstate relations. This law protects contracts negotiated electronically by giving them a legal recognition. Section 101(a) of the ESIGN act states that a signature or a contract negotiated by electronic means enjoys legal recognition and validity. This contract shall not deny the advantages of a legal procedure simply because it is electronic.

Section 101 (c) of the act requires a consumer to consent to the use of an electronic signature, while section 101 (d) denotes that a business organization can use an electronic signature as long as it is accessible to the parties concerned, and the business can produce it without an alteration for reference (Batten, 41). Various States in America have their own laws guiding the use of digital signatures. For example, in Indiana, there is the Uniform Electronic Transaction Act. This act recognizes digital signatures, and the transactions.

For instance, section 102(5) defines an electronic signature as a means that relates to technological know-how that produces magnetic, optical, wireless, electronic, digital, and/or similar capabilities. Section 102 (8) defines electronic signature, and its definition agrees with the definition contained in the American Code and ESIGN act. In Hawaii, the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mathematical Focus on RSA Public & Private Key encryption Research Paper”, n.d.)
Mathematical Focus on RSA Public & Private Key encryption Research Paper. Retrieved from https://studentshare.org/mathematics/1607236-mathematical-focus-on-rsa-public-private-key-encryption
(Mathematical Focus on RSA Public & Private Key Encryption Research Paper)
Mathematical Focus on RSA Public & Private Key Encryption Research Paper. https://studentshare.org/mathematics/1607236-mathematical-focus-on-rsa-public-private-key-encryption.
“Mathematical Focus on RSA Public & Private Key Encryption Research Paper”, n.d. https://studentshare.org/mathematics/1607236-mathematical-focus-on-rsa-public-private-key-encryption.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mathematical Focus on RSA Public & Private Key encryption

Communication Technology Design for Confidentiality and Quality Monitoring of CV Service

In 1976 the idea of public key encryption was introduced to the field of cryptography.... Public key encryption techniques or asymmetric key systems avoid the need to distribute keys in secret.... ks} KT =C T: {R}ks, {ks}KT =CNINQNIZSCStep 6 __A suitable value for Tait's private key KT __KT =7Step 7The result of decrypting the encrypted session key __ using Tait's private key KT{{ks}KT}KT = ONENINETWO Question 3Complete the following unfinished sections in the main body and appendix of the report printed in the appendix to this companion, and referred to in the 'Background for Questions....
6 Pages (1500 words) Essay

Networking Infrastructure

emote server options: The user can set options for specific DNS servers to perform such tasks as blocking information from a bad server, setting encryption keys to use with a server or defining transfer methods.... Tanenbaum) The above architecture consists of four areas: NC area (NCA), freely accessible area (FAA) for subscription purposes, protected provider's private area (PPA) for service-specific servers and global Internet (GI).... Setting up a DHCP server enables the user to manage the addresses and other network information for client computers on the private network....
15 Pages (3750 words) Essay

Asymmetric or Symmetric Key Encryption

This paper “Asymmetric or Symmetric key encryption” presents an overview of two encryption techniques.... hellip; The author states that symmetric key encryption is also known as a shared key or shared secret encryption.... Basically, in symmetric key encryption, both the data sender and receiver make use of the same key to both encrypt and decrypt data.... Some of the well-known examples of symmetric key encryption comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010)....
2 Pages (500 words) Case Study

Report on Public Key Encryption

As a result, the public key encryption provides an identity to the world.... However, public key encryption makes use of long numbers.... These numbers are known as keys (Ferguson Public key encryption The world has become electronic in almost all its activities.... As a result, the public key encryption provides an identity to the world.... However, public key encryption makes use of long numbers.... This paper, therefore, provides a detailed report on Public key encryption....
1 Pages (250 words) Assignment

Final project

RSA particularly works by simple mathematical relationships both in key generation, encryption and decryption.... In public key cryptography, encryption and description permit two conveying gatherings to mask data they send to one another.... RSA (Rivest, Adleman and Shamir) cryptosystem is currently one of the most practical and widely used public-key cryptosystems especially in the field of data security.... A certificate is an electronic archive used to recognize an individual, a server, an organization, or some other element and to partner that character with a public key....
4 Pages (1000 words) Research Paper

The Nature of Encryption Exploitation Technologies

In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007).... This coursework "The Nature of encryption Exploitation Technologies" gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies, the processes of converting original information into ciphertext.... nbsp;… encryption is achieved by the use of an encryption algorithm composes of a set of formulae that converts plain text into the ciphertext format....
6 Pages (1500 words) Coursework

Encryption of Video over WiFi

This coursework "encryption of Video over WiFi" describes aspects of the process of data transformation.... This paper outlines background of video encryption, types of encryption algorithms, the encryption proccess, artificial neural networks,  the reuslts of video encryption.... Based on this subject, the growing quantity of video data modified in various forms has made it difficult to come up with standard algorithms that would see to it that all encryptions are impermeable  Ever since 1977 Data encryption Standard (DES) has been one of the most commonly used encryption standards....
7 Pages (1750 words) Coursework

Digital Signatures and Public Key Encryption

… The paper "Digital Signatures and Public key encryption" is a delightful example of a term paper on information technology.... The paper "Digital Signatures and Public key encryption" is a delightful example of a term paper on information technology.... However, the best method for the bank to adapt is public-key encryption.... Public-key encryption allows for the existence of a private and public key.... For the banking sector, due to its large distribution networks, the public key encryption is the best for it will be dispersed to all its customers when sending messages....
2 Pages (500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us