Secure Encrypted Communications

Anonymous

Question Description

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption.

Write a four to five (4-5) page paper in which you:

  1. Compare and contrast symmetric encryption to asymmetric encryption.
  2. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.
  3. Evaluate the advantages and disadvantages of using digital certificates.
  4. Evaluate the challenges related to public and private key management when using PKI.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

  • Implement PKI and encryption solutions to ensure the confidentiality of business communications.
  • Use technology and information resources to research issues in access control.
  • Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions

Tutor Answer

Vndungu11
School: UC Berkeley

Answer posted please confirm.Kindly go through the work and let me know in case of any question,problem or clarificationPlease contact me in case of anything unsatisfactory or if a certain requirement has not been met.If the work is okay,looking forward to work with you again.Thanks
Attached.

1

Running Head: SECURE ENCRYPTED COMMUNICATION

Secure encrypted communication
Name
Institution affiliation
Date

2

SECURE ENCRYPTED COMMUNICATION

Secure encrypted communication
Introduction
Transmission of sensitive information via the internet requires cryptography algorithm
that encrypts data from an external party. Network security is crucial to sustaining online
businesses. Secure encrypted information includes information such as credit card digits, login
details to retail sites as well as social security numbers as they entail personal information.
Different types of encryption are utilized to secure confidential information of users and
organizations online. Public essential infrastructure involves policies that manage encryption
online. Facilitation of electronic transfer is enabled with public key infrastructure confidentially.
A public key is proved with a possession of a digital certificate. The paper discusses secure
encrypted communication over the internet.
Compare and contrast symmetric encryption to asymmetric encryption.
Symmetric encryption
Symmetric encryption goal is to ensure privacy, as well as authenticity, is maintained in
communication. Symmetric encryption is developed through an algorithm that prevents
unauthorized access to information that is regarded confidential. Encryption algorithm starts
when user online sends data to a particular destination online while the receiver will decrypt the
data with the set of instructions. Symmetric encryption utilizes similar keys that represent
confidential information among online users. Symmetric encryption uses stream cipher for digit
encryption a byte and block ciphers for some bits in a chunk. Symmetric encryption requires

3

SECURE ENCRYPTED COMMUNICATION

parties involved in the online transaction have a secret key copy in a channel that is secure. Bulk
information is encrypted symmetrically.
In symmetric encryption, the computer set of instruction is made public while the key is
confidential. Security o...

flag Report DMCA
Review

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors