paper regarding public key encryption

ryvwnu54
timer Asked: Sep 9th, 2015

Question Description

Hi I have a paper regarding public key encryption and how it works due in a few hours. I already wrote 2 pages but I'm stuck I dont know what else to write. Can you help me write a few more pages for a reasonable price

please read requirements are go through the paper. I need the paper in 5 hours if possible.

PKI Public Key Infrastructure.docx 

i need 3-4 page

Unformatted Attachment Preview

A 3-5 page paper single spaced discussing public key encryption and the need for and issues that surrounding companies adopting (or not) PKI PKI: Public Key Infrastructure Sending sensitive data over any web or network could be one of the toughest things to guarantee, especially when sending sensitive data over to a specific person on the other end of the string because there are so many interferences or obstacles that could incur to interfere with the information or messages a person is trying to send whether it’s tweaking the information, deleting it, chopping sections of it or basically just copying it and keeping it using it when sensitive information could really hurt the participants if the data and information gets leaked or gets into the hands of people that aren’t supposed to have that information. PKI, Public Key Infrastructure helps ensure that the data or information that is being sent over the Internet is being sent between the expected participants and no one else, it also helps keeping the data safe and secure incase it gets leaked throughout the communication line, the information will not be in plain text therefore they will not be able to know what’s contained in the message. To do so, PKI uses public key and private keys to encrypt and decrypt information. The public key is used to send give to the sender so they use it while encoding the message. The sender uses the receivers public key with the message they’re trying to send to encode the message according to the public key, which is linked to the receivers private key as well. The receiver then uses the encoded message and they’re private key and a passcode if applicable to decrypt the message. The private key is only for you; you only use your private key to decrypt a message and you don’t have to share it with the sender, only the public key is sent to the sender. The usage of public and private keys ensures that the message is going to the right person, because if someone encrypts the message using the senders public key but another person tries to decrypt it using their own or another private key that’s not linked to the public key used to decrypt the message, the decryption will fail. Only the person with the private key linked to the public key given to the sender of the encoded message to use while encoding the message can decrypt the message. “A trusted party, called a certificate authority (CA), acts as the root of trust and provides services that authenticate the identity of individuals, computers and other entities. A CA issues digital certificates to entities and individuals after verifying their identity. It signs these certificates using its private key; its public key is made available to all interested parties in a self-signed CA certificate. CAs use this trusted root certificate to create a "chain of trust"”1 Even though public key infrastructure involves a lot of security and it tries to be as safe as possible to ensure the transition of the message, but there are always glitches. Even though the CA is usually defined as being trusted, that normally means that it handles its own private keys properly which means that you shouldn’t automatically trust any source as soon as you see CA. 1 http://searchsecurity.techtarget.com/definition/PKI
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors