Sign In
Not register? Register Now!
You are here: HomeCourseworkIT & Computer Science
Pages:
3 pages/≈825 words
Sources:
No Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Cryptography IT & Computer Science Coursework Paper (Coursework Sample)

Instructions:

Cryptography

source..
Content:

Describe two specific uses of encryption on the internet
1 To make Internet communications secure by making sure that no one but the intended recipient knows what is in a message sent by the sender.
2 To ensure data confidentiality and privacy in commercial transactions by protecting consumer credit card numbers, birthdate, and social security numbers.
Describe how the application uses encryption including the algorithm (steps) that is used to encrypt something.
It uses encryption to ensure confidentiality and integrity. Encryption converts the plaintext readable message to ciphertext. It requires a key in encrypting and decrypting a message. Creating a ciphertext requires a cipher which is a series of well-defined steps (algorithms) used to encrypt and decrypt messages. Using a public key encryption system where any person can encrypt a message using the public key of the receiver and the receiver is the only one that can decrypt it using his private key. Pairs of unrelated keys make this algorithm secure.
RSA (Rivest-Shamir-Adelman): uses the product of two very large prime numbers with an equal length of between 100 and 200 digits. It is used for secure communications. It depends on asymmetric encryption and covers signing and also encrypts the contents of the message.
DIFFIE-HELLMAN: Provides an electronic exchange method to share the secret key. Examples like TLS, SSL, SSH, IPsec uses this algorithm.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Creating an Internet and E-mail Acceptable Use Policy
    Description: You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, ...
    25 pages/≈6875 words| No Sources | APA | IT & Computer Science | Coursework |
  • Compare Internet and E-Mail Use Policies
    Description: You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, ...
    25 pages/≈6875 words| No Sources | APA | IT & Computer Science | Coursework |
  • Internet and E-mail Acceptable Use Policy
    Description: You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware,...
    25 pages/≈6875 words| No Sources | APA | IT & Computer Science | Coursework |
Need a Custom Essay Written?
First time 15% Discount!