Monday, June 17, 2019
Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 words
Report on Public Key Encryption - Assignment ExampleThe process becomes more unspoilt when the numbers are longer. There are two keys and they include the private and general keys. For example, the smartcard and a padlock for the private and public keys, respectively.For example, Kevin could send Alice important entropy that he wants to ensure only she gets to read it. Therefore, Kevin autographs the data with Alices public key since only Alice knows this public key hence she alone can encrypt the data in its original form.An individual needs to prove that he or she owns the identity element when they are online. This is because the document needs to recognize the identity of the user in order to know the person (Paar & Pelzl, 2010 p152). In addition, the keys help in coding of data. For instance, the message is applied to a publicly known mathematical hashing maneuver that coverts the message in to a long number referred to as the hash. This is because the hash is part of the document that is signed to a user (Paar & Pelzl, 2010 p293). Consequently, when data has been scrambled using a private key, it is unscrambled using the public key. The reverse also happens when the private key is used to unscramble. This is done using another hash that is obtained from the data.In conclusion, the public key encryption aids the protection of data or information. Therefore, an individual signs in using a number of keys. The keys are what the data uses to check the identity of the person. As a result, the keys act as a signature of verification for online
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.