Preview

Is3230 Lab 1 PKI Analysis

Better Essays
Open Document
Open Document
851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3230 Lab 1 PKI Analysis
IS3230 Lab 8 Align Appropriate PKI Solutions
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
8 May 2014

A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography. The Hash algorithm (or hash function) is an algorithm that computes a value based on a data object such as a message or file. The object is usually of variable length, possibly very large, thereby mapping the data object to a smaller data object. This is the “hash result” which is usually a fixed-size value.
Block cipher or 'block' is an amount of data treated as a single unit. A block cipher is a cipher that requires the accumulation of a complete block before transformation can be completed.
Symmetric Benefits
…show more content…
The digital signature process results in a bit string that allows a recipient of a message to verify the identity of the signer of the message and the integrity of the message. Any one of several digital signature algorithms can generate the bit string. These algorithms have the generic characteristic that private information is used to make a signature and public information is used to verify signatures. A private key should be unique to its owner. If the owner of a private key uses it to encrypt a digital document, that encryption may be assumed to have the same meaning as a paper signature. It is a like a mark on the document that only the owner could have

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The Johnson Company is a small business that provides networking components and services. They are in need of new methods of communication for reaching out to new customers, standing out from other businesses, meeting existing customer needs, and keeping customers informed of news and updates. The Johnson Company still uses analog phone lines and still takes customer orders by hand. Their only current method of advertising is an ad in the yellow pages. They have reached out to our IT consulting firm to help them update their current business processes and communications…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    In a computer network internet protocol is used for communication, to each device such as printers and computers a numerical label called an IP (Internet Protocol) Address is assigned. There are two functions of an IP Address a host or network interface identification, and also provides a location addressing. The basic elements of a network are the IP Address and Subnet Mask. There is also switching and routing which after you connect devices to switches and routers, data packets can be moved across the network. The Internet Protocol Version 4 (known as IPv4) is a protocol highly used even today, this IP Address consist of a 32-bit number in decimal or binary in four parts. In 1995 Internet Protocol Version 6 (known as IPv6) was created due to a high growth of the Internet, and the reduction of…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ITT Tech EN3220_Analysis1

    • 696 Words
    • 2 Pages

    Critical and creative thinking skills are a must when you have a family with two working parents and two children. This past year my wife and I have had to become very creative with our budgeting to keep our family on a clear financial track. Raising a family can be tricky for anyone but when financial problems unexpectedly arise it really throws a curve ball in the mix. We had to do some quick thinking and come up with some unusual methods to keep our family on track with the holidays quickly approaching. We used creative thinking to look around for the ideas and critical thinking to put those creative ideas out and decide which ones would work best for our situation.…

    • 696 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    A block quote is a longer quote. It consists of more than about 30 words when using the author-date (Harvard) system:…

    • 2049 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    On the other side, a block is a molded rectangular brick of clay or sand enclosed in a molder and hardened for long hours and used as a building and paving material. Bricks were often used for reasons of speed and economy [5].…

    • 1123 Words
    • 5 Pages
    Powerful Essays