Preview

Is3230 Lab 1 PKI Analysis

Better Essays
Open Document
Open Document
851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3230 Lab 1 PKI Analysis
IS3230 Lab 8 Align Appropriate PKI Solutions
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
8 May 2014

A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography. The Hash algorithm (or hash function) is an algorithm that computes a value based on a data object such as a message or file. The object is usually of variable length, possibly very large, thereby mapping the data object to a smaller data object. This is the “hash result” which is usually a fixed-size value.
Block cipher or 'block' is an amount of data treated as a single unit. A block cipher is a cipher that requires the accumulation of a complete block before transformation can be completed.
Symmetric Benefits
…show more content…
The digital signature process results in a bit string that allows a recipient of a message to verify the identity of the signer of the message and the integrity of the message. Any one of several digital signature algorithms can generate the bit string. These algorithms have the generic characteristic that private information is used to make a signature and public information is used to verify signatures. A private key should be unique to its owner. If the owner of a private key uses it to encrypt a digital document, that encryption may be assumed to have the same meaning as a paper signature. It is a like a mark on the document that only the owner could have

You May Also Find These Documents Helpful