ITAS 367 Atlantic International Unit 3 Public Key Encryption Essay

User Generated

froyrlr16

Computer Science

ITAS 367

Atlantic International University Online

ITAS

Description

Assignment Details

Assignment Description

Your consulting assignment with the security staff has been a success. The staff understands the encryption concepts that you have explained. The latest discussions have been on public-key cryptography. The following are some specific questions that need to be explained in more detail:

  • What are the 4 key elements of a public-key directory?
  • What is a public-key certificate?
  • Explain the elements of a public-key directory, and include an explanation of a public-key certificate.
  • Research the tools available to create a Secure Shell public-key certificate using the Windows environment.
  • Differentiate between the tools researched and make a recommendation for 1 tool that you examined. Supply the reasons for your recommendation.
  • Describe the process used to generate a public-key certificate using your recommended tool. Include challenges and any best practices.

Note: This assignment builds upon your cryptography knowledge. Recall your Security Pro (Module 9, entitled Data Including Cryptography Activities) lab work in the ITAS363 Unit 3 IP. Refer back to your work if you would like to refresh your memory in support of this assignment.

Prepare a Word document that covers the topics in 3–5 pages. The information contained within the Word document must be professional in appearance.

Reference your sources in APA format.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

1
Running Head: INDIVIDUAL ASSIGNMENT – PUBLIC KEY ENCRYPTION

Individual Assignment – Public Key Encryption
Student’s Name
Institution
Date

2
INDIVIDUAL ASSIGNMENT – PUBLIC KEY ENCRYPTION
Public-key encryption
Public-key encryption is a form of data encryption that uses two types of keys. A public
key that ai widely distributed and known and a private key that only the owner and person
meant to open the file has. This is the most common type of data encryption. There are various
ingredients of a public-key encryption system (Ma et al., 2017). Public-key encryption takes
keen use of a plain text, encryption algorithm, public and private key ciphertext, and a
decryption algorithm. These are the essential components that are used in a public-key
encryption system.
A plain text is a message that the person intends to send and transfer to the receiver. In
a public-key system, there are two parties, the sender and the receiver. The sender is responsible
for encoding the message to be sent. This message is referred to as the plain text. After the
encoding, the text is run through an encryption algorithm. It is this encryption algorithm that
secures the text from being accessible to any other person. The encryption algorithm is
responsible for attaching a uniq...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags