Description
Assignment Details
Assignment Description
Your consulting assignment with the security staff has been a success. The staff understands the encryption concepts that you have explained. The latest discussions have been on public-key cryptography. The following are some specific questions that need to be explained in more detail:
- What are the 4 key elements of a public-key directory?
- What is a public-key certificate?
- Explain the elements of a public-key directory, and include an explanation of a public-key certificate.
- Research the tools available to create a Secure Shell public-key certificate using the Windows environment.
- Differentiate between the tools researched and make a recommendation for 1 tool that you examined. Supply the reasons for your recommendation.
- Describe the process used to generate a public-key certificate using your recommended tool. Include challenges and any best practices.
Note: This assignment builds upon your cryptography knowledge. Recall your Security Pro (Module 9, entitled Data Including Cryptography Activities) lab work in the ITAS363 Unit 3 IP. Refer back to your work if you would like to refresh your memory in support of this assignment.
Prepare a Word document that covers the topics in 3–5 pages. The information contained within the Word document must be professional in appearance.
Reference your sources in APA format.
Explanation & Answer
Hi, kindly find attached
1
Running Head: INDIVIDUAL ASSIGNMENT – PUBLIC KEY ENCRYPTION
Individual Assignment – Public Key Encryption
Student’s Name
Institution
Date
2
INDIVIDUAL ASSIGNMENT – PUBLIC KEY ENCRYPTION
Public-key encryption
Public-key encryption is a form of data encryption that uses two types of keys. A public
key that ai widely distributed and known and a private key that only the owner and person
meant to open the file has. This is the most common type of data encryption. There are various
ingredients of a public-key encryption system (Ma et al., 2017). Public-key encryption takes
keen use of a plain text, encryption algorithm, public and private key ciphertext, and a
decryption algorithm. These are the essential components that are used in a public-key
encryption system.
A plain text is a message that the person intends to send and transfer to the receiver. In
a public-key system, there are two parties, the sender and the receiver. The sender is responsible
for encoding the message to be sent. This message is referred to as the plain text. After the
encoding, the text is run through an encryption algorithm. It is this encryption algorithm that
secures the text from being accessible to any other person. The encryption algorithm is
responsible for attaching a uniq...