Task 8 (M2)

Public and private key is an encryption technique used to secure data. Explain the operation and use of any encryption technique from the list below.

Introduction:

Encryption technique is the translation of data into a secret code that will prevent hackers or identity thieves from being able to break or read the data that is sent across the network.

Public key and private is a type of encryption technique that can be used ensuring that the communication on the network is secured. When you sending a message to someone through the network, will need to use the public key of the receiver and the receiver will use the private key to decrypt the message. This encryption will avoid unauthorised access to the message such as reading
*…show more content…*

The web browser that user use to connect to the website and the web server that the website available on the internet uses a process call hand shake to ensure the data transmitted. The information that sent through between the server and user will be encrypted means that no one can decrypt them unless they have the private key of the message. SSL uses cryptographic system that uses two keys to encrypt data such as public key which is a key known to everyone and private key known to the only to the recipient of the message .This will prevent hackers or identity theft from getting an access to the information. It will allow users to trust using their personal information or bank credit card within a website. The website that uses this type of encryption technique will track more viewers or customers to use the website. If is a shopping a website it will increase the company income because customers will uses the website to purchase product as they trust to use their information within that website. To add SSL to a website will need to need create a certificate signing request on the server, which will create public key and private key on the server. When a website uses SSL security will notice in URL link that there is a lock or a green bar included or

Related

- Decent Essays
## Nt1310 Unit 1 Assignment 1

- 1060 Words
- 5 Pages

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections and remote access facilities. OpenVPN allows authentication using certificates or username/password. OpenVPN can work in two different modes regarding encryption. It can use static encryption or Public Key Infrastructure (PKI). The advantage of static encryption is that it is very easy to configure. The disadvantage of this type setup is that if your encryption key is compromised, all VPN data can easily be decrypted. The PKI mode resolves many of the issues static encryption has. It

- 1060 Words
- 5 Pages

Decent Essays - Decent Essays
## Nt1330 Unit 3 Fundamental Analysis

- 654 Words
- 3 Pages

There are Seven Core Components for the PKI or Public Key Infrastructure. The following are the center parts and the clarification in detail.

- 654 Words
- 3 Pages

Decent Essays - Better Essays
## IS3440 Unit 2 Discussion

- 3306 Words
- 14 Pages

2. GnuPG allows to encrypt and sign your data and communication, features a versatile key managment system as well as access modules for all kind of public key directories.

- 3306 Words
- 14 Pages

Better Essays - Decent Essays
## Unit 2 Assignment 1: Executive Summary

- 527 Words
- 3 Pages

Encryption of data stored on media is used to protect the data from unauthorized access should the media ever be stolen.

- 527 Words
- 3 Pages

Decent Essays - Satisfactory Essays
## Essay about IS3230 Lab 5 Chris Wiginton

- 1168 Words
- 5 Pages

a) A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.

- 1168 Words
- 5 Pages

Satisfactory Essays - Decent Essays
## Case Project 8-1 : Configuring Encryption

- 991 Words
- 4 Pages

Encryption is a process that turns information that is plainly readable into scrambled form in order to preserve the authenticity, integrity, and privacy of the information that passes through the security perimeter (Michael E. Whitman, 2009). It is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties (Rouse, 2014).

- 991 Words
- 4 Pages

Decent Essays - Decent Essays
## Encryption in Today's Information Systems

- 753 Words
- 4 Pages

When a fellow general received the message, he would wrap the paper around his corresponding scytale to decipher the message (Tyson 2014). Since the advent of computers though, encryption has become increasing important and relies almost solely on cryptographic means to secure information. When speaking about encryption today, it refers more to the process rather than the mathematical formulas used to scramble data. The basic idea behind encrypting a computer message is such that it is scrambled with a sequence of random bits, known as a key, and only parties with the corresponding key can transpose it back into a comprehensible format. These keys are created via a cipher, otherwise known as an algorithm. When a user sends a message, known as the plaintext, across a network, the computer applies an algorithm to the information to encode it, resulting in a ciphertext (Encryption Basics 2014). This method can be best summarized visually:

- 753 Words
- 4 Pages

Decent Essays - Satisfactory Essays
## Unit 3 Encryption In Communication

- 135 Words
- 1 Pages

Encryption is a process of converting Plain text into Cipher text. This un-readable message can be communicated over an unsecure network without the fear of loss of integrity and confidentiality. Encryption process is done using encryption algorithm.

- 135 Words
- 1 Pages

Satisfactory Essays - Decent Essays
## Triple DES Model

- 8729 Words
- 35 Pages

Asymmetric key system (or asymmetric algorithm; public key): A cryptographic system that uses two separate keys: one key to encrypt and a different key to decrypt information. These keys are known as public and private

- 8729 Words
- 35 Pages

Decent Essays - Decent Essays
## Data Encryption Essay

- 1023 Words
- 5 Pages
- 1 Works Cited

Symmetric key encryption is where the key is used to not only encrypt a message but to decrypt it as well. This is also known as conventional and secret key encryption. Symmetric key encryption is rarely used due to the fact that the person who encrypts the information has to get the key to the person who decrypts the information. This is uncommonly used because if the key is intercepted by an unauthorized person, there can

- 1023 Words
- 5 Pages
- 1 Works Cited

Decent Essays - Good Essays
## Encryption Vs. Encryption : Annotated Bibliography

- 2472 Words
- 10 Pages

Encryption is a cryptography in which one covers data or information by transforming it into an undecipherable code. Encryption generally uses a predefined parameter or key to perform the data change. Some encryption computations oblige the best approach to be the same length as the message to be encoded yet other encryption counts can take a shot at much more diminutive keys concerning the message. Separating is as often as possible described close by encryption as it’s backwards. Unscrambling of encoded data realizes the first data. Encryption is used as a piece of customary forefront life. Encryption is most used among trades over flimsy channels of correspondence for instance the web. Encryption is also used to secure data being traded between contraptions, for instance, modified teller machines (ATMs), cells, and various more. Encryption can be used to make automated imprints, which allow a message to be affirmed. Exactly when honest to goodness executed, an automated imprint gives the recipient of a message inspiration to acknowledge the message was sent by the affirmed sender. Modernized imprints are outstandingly significant when sending tricky email and distinctive sorts of cutting edge correspondence. This is by and large equivalent to standard composed by hand marks, in that, an all the more astounding imprint passes on a more multifaceted methodology for manufacture. Figure a figure is an estimation, strategy, or method for performing encryption and translating.

- 2472 Words
- 10 Pages

Good Essays - Good Essays
## Elliptic Curve Cryptology Used to Make Keys

- 1066 Words
- 5 Pages
- 6 Works Cited

Elliptic curve cryptography (ECC) is a public key cryptography technique by making use of elliptic curve properties and their algebraic structure of over finite fields. It is one of the efficient ways of providing encryption of cryptographic keys.

- 1066 Words
- 5 Pages
- 6 Works Cited

Good Essays - Decent Essays
## Questions On Simple Symmetric Protocol

- 2173 Words
- 9 Pages

A public key system works in the following manner: Alice and Bob each have two keys, one of which is secret to themselves and the other which is publicly known. The publicly-known key is registered with a trusted

- 2173 Words
- 9 Pages

Decent Essays - Decent Essays
## Quadratic Residues Essay

- 768 Words
- 4 Pages

In Public Key Crypto system, it is required to know the Public Key of Receiver to encrypt the messages. So that receiver can decrypt the message using his/her own private key. This system needs to maintain directories which holds Public Keys of each user. To eliminate the need of maintaining such directories, this paper suggests computing the public key using receiver’s identity such as Email address. However, implementation of such system which is secure and practical, is difficult. The system uses Quadratic Residues modulo a large composite integer. [2]

- 768 Words
- 4 Pages

Decent Essays - Decent Essays
Cryptography is an indispensable tool of techniques for the secured communication between two parties in the presence of third party. A cryptographic algorithm is a mathematical function for encryption or decryption where encryption is the process of translating plain text/ data into a random and meaningless (cipher text) data and decryption is the process of converting cipher text back into plain text. In most of the cases, two functions are involved, one for encryption and the other for decryption. It is basically about constructing and analyzing protocols which prevents public from reading the private messages.

- 796 Words
- 4 Pages

Decent Essays