Verified Document

Information Technology Cryptography A Public-Key Term Paper

Once an SSL connection is recognized, the server certificate in use can usually be scrutinized by looking at the assets of the page conveyed over the SSL connection. Certificates and keys are normally stored on the hard disk of the computer. Additionally to needing a password when the private key is used, it is typically also required to import or export keys and certificates. Some browsers also hold key and certificate storage on a secure external device (Using PKI, 2004). Certificates given to web servers and individuals are signed by a Certificate Authority. The signature on a certificate recognizes the particular Certificate Authority that issued a certificate. The Certificate Authority in turn has a certificate that connects its identity to its public key, so you can verify its uniqueness. A certificate authority issues a policy defining its practices so users of certificates issued by that Authority have a basis from which to make a trust judgment for transactions based on PKI (Using PKI, 2004).

Public-key cryptography facilitates the following tasks:

Encryption and decryption permit two communicating parties to disguise information they send to each other. The sender encrypts, or scrambles the information before sending it. The receiver decrypts, or unscrambles, the text after receiving it. While in transit, the encrypted information is jumbled to an intruder.

Tamper detection allows the receiver of information to verify that it has not been modified in transit. Any attempt to change data or substitute a false message for a legitimate one will be discovered.

Authentication allows the recipient of text to determine its origin and to confirm the sender's identity.

The first is plaintext which is the readable message or data that is fed into the algorithm as input. The second is encryption algorithm which performs various transformations on the plaintext. The third and fourth ingredients are the public and private key which is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The precise transformations performed by the encryption algorithm depend on the public or private key that is provided as input. The fifth ingredient is ciphertext which is the scrambled message produced as output. It depends on the plaintext and the key. The last ingredient is decryption algorithm which is when the algorithm accepts the ciphertext and the matching key and produces the original plaintext (Introduction to Public-Key Cryptography, 1998).
References

Introduction to Public-Key Cryptography. (1998). Retrieved April 8, 2010, from Web site:

http://docs.sun.com/source/816-6154-10/contents.htm

Public Key Certificate. (2010). Retrieved April 7, 2010, from Search Security Web site:

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci497876,00.html

Public Key Directory. (2010). Retrieved April 9, 2010, from The Kumachan Website:

http://www.thekumachan.com/?p=1863

Using PKI. (2004). Retrieved April 9, 2010, from Dartmouth Computing Web site:

https://www.dartmouth.edu/~pkilab/pages/Using_PKI.html

Sources used in this document:
References

Introduction to Public-Key Cryptography. (1998). Retrieved April 8, 2010, from Web site:

http://docs.sun.com/source/816-6154-10/contents.htm

Public Key Certificate. (2010). Retrieved April 7, 2010, from Search Security Web site:

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci497876,00.html
http://www.thekumachan.com/?p=1863
https://www.dartmouth.edu/~pkilab/pages/Using_PKI.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Public Key Infrastructure Email Communication Has Strongly
Words: 1007 Length: 4 Document Type: Case Study

Public Key Infrastructure Email communication has strongly increased in the last couple of years and its still growing. It's hard to find a company which doesn't use email to run its business processes both within the company and with external business partners and clients. Therefore, the eminent security threat to the company's network infrastructure and content of the company products should be priories. The use of Public Key Infrastructure (PKI) would

Information Technology Refuting the Claims
Words: 3173 Length: 12 Document Type: Thesis

Linux Kernel Analysis Much has been written in praise of the Linux (Crandall, Wu, Chong, 359), (Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how

Information Technology Hilcorp Energy Company
Words: 3743 Length: 12 Document Type: Research Proposal

Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization

Cryptography History of Cryptography the
Words: 1446 Length: 5 Document Type: Term Paper

In this manner, if the transmitted information is intercepted by a cyber-thief, the information will remain useless to him since it is in an encrypted form that is incomprehensible to him. Banks is another common user of cryptography and whose input and output information are critical and must remain confidential. These days, a large percentage of banking transactions can be done online. Hence it is very critical that the information

Information Technology IT Security Systems
Words: 3128 Length: 11 Document Type: Essay

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Cryptography
Words: 4153 Length: 15 Document Type: Term Paper

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account). Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now