Wednesday, May 8, 2019

Report on Public Key Encryption Assignment Example | Topics and Well Written Essays - 250 words

Report on Public Key Encryption - Assignment voiceThe process becomes more secure when the numbers are longer. There are two keys and they include the head-to-head and public keys. For example, the smartcard and a padlock for the surreptitious and public keys, respectively.For example, Kevin could send Alice important data that he wants to assure only she gets to read it. Therefore, Kevin encrypts the data with Alices public key since only Alice knows this public key thence she alone can encrypt the data in its original form.An one-on-one needs to prove that he or she owns the identity when they are online. This is because the document needs to recognize the identity of the user in pasture to know the person (Paar & Pelzl, 2010 p152). In addition, the keys help in coding of data. For instance, the message is applied to a in public known mathematical hashishing function that coverts the message in to a long number referred to as the hash. This is because the hash is part of t he document that is signed to a user (Paar & Pelzl, 2010 p293). Consequently, when data has been scrambled using a private key, it is unscrambled using the public key. The reverse also happens when the private key is used to unscramble. This is done using other hash that is obtained from the data.In conclusion, the public key encryption aids the protection of data or information. Therefore, an individual signs in using a number of keys. The keys are what the data uses to check the identity of the person. As a result, the keys act as a signature of verification for online

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.