Secure Encrypted Communications


Question Description

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption.

Write a four to five (4-5) page paper in which you:

  1. Compare and contrast symmetric encryption to asymmetric encryption.
  2. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.
  3. Evaluate the advantages and disadvantages of using digital certificates.
  4. Evaluate the challenges related to public and private key management when using PKI.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

  • Implement PKI and encryption solutions to ensure the confidentiality of business communications.
  • Use technology and information resources to research issues in access control.
  • Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions

Tutor Answer

School: UC Berkeley

Answer posted please confirm.Kindly go through the work and let me know in case of any question,problem or clarificationPlease contact me in case of anything unsatisfactory or if a certain requirement has not been met.If the work is okay,looking forward to work with you again.Thanks



Secure encrypted communication
Institution affiliation



Secure encrypted communication
Transmission of sensitive information via the internet requires cryptography algorithm
that encrypts data from an external party. Network security is crucial to sustaining online
businesses. Secure encrypted information includes information such as credit card digits, login
details to retail sites as well as social security numbers as they entail personal information.
Different types of encryption are utilized to secure confidential information of users and
organizations online. Public essential infrastructure involves policies that manage encryption
online. Facilitation of electronic transfer is enabled with public key infrastructure confidentially.
A public key is proved with a possession of a digital certificate. The paper discusses secure
encrypted communication over the internet.
Compare and contrast symmetric encryption to asymmetric encryption.
Symmetric encryption
Symmetric encryption goal is to ensure privacy, as well as authenticity, is maintained in
communication. Symmetric encryption is developed through an algorithm that prevents
unauthorized access to information that is regarded confidential. Encryption algorithm starts
when user online sends data to a particular destination online while the receiver will decrypt the
data with the set of instructions. Symmetric encryption utilizes similar keys that represent
confidential information among online users. Symmetric encryption uses stream cipher for digit
encryption a byte and block ciphers for some bits in a chunk. Symmetric encryption requires



parties involved in the online transaction have a secret key copy in a channel that is secure. Bulk
information is encrypted symmetrically.
In symmetric encryption, the computer set of instruction is made public while the key is
confidential. Security o...

flag Report DMCA

Thanks for the help.

Outstanding. Studypool always delivers quality work.

Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.


Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors