Question

Read the Pretty_Good_Privacy article. provide answers to the following questions: a) describe the private key files...

Read the Pretty_Good_Privacy article.

provide answers to the following questions:

a) describe the private key files

b) describe the function of GPG

c) what is a cryptographic algorithm?

d) What are the different categories? What are the common ones?

e) What is a key ring (secring.pgp & pubring.pgp)? (for this question, refer to the PPT

lecture)


0 0
Add a comment Improve this question Transcribed image text
Answer #1

(a) Ans- The private key file is file that is used for encryption or decryption of data sent between your server and the connecting client for secure communications. A private key is generated when if two organization will communicate(SSL) with each other with some conditions. So there is so many confidential things that should be hack if they will communicate, for this there is certification signing will happen before communication. A private key is created by you—the certificate owner—when you request your certificate with a Certificate Signing Request (CSR). The Certificate Authority providing your certificate. Private key file is very confidentials for server and client because when they will try to communicate with each other they have to mention the primary key file.

(b) Ans- GPG( GNU Privacy Guard ) is free encryption software that's compliant with the OpenPGP standard. Using GPG you can encrypt (and decrypt) files that contain sensitive data, such as protected health information (PHI) regulated by the Health Insurance Portability and Accountability Act (HIPAA) privacy and security rules.

GPG has various functions some are-

(i) With GPG we can create of encryption key.

(ii) Encrypt a file

(iii) Decrypt a file.

(c) Ans- In simple way we can say that Cryptography is techniques for securing communication and data in the presence of adversaries(Internet).

there are 5 most popular algorithms are there-

(i) Tripl DES: -

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

(ii) RSA: -

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs. Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. You’ve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

(iii) Blowfish: -

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually. Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

(iv) Twofish: -

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed. Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

(v) AES: -

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations. Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes. AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

(d) Ans:- please find an attachment for this question:-

(v) Ans:-

So Key ring is basically includes collection of certificates that identify a networking trust relationship. It is mainly made up of Private key and Public either receiver or client. And this key is confidential for both because they need to include whenever they will have communicate with each other.

secring.pgp is the place where the secrete keys are stored. Your keyrings are kept in two files. Your secret key is kept in the file SECRING.PGP and your public keys as well as the public keys of the people you encrypt to are kept in PUBRING.PGP. Both of these files should be backed up on a secure medium and kept in a safe place. If you lose SECRING.PGP and don't have a secure copy then you are stuck. You will need to generate a new key pair and re-distribute the matching public key to all your correspondents. SECRING.PGP is protected by your pass phrase. Don't write the pass phrase down, anywhere. Also, do not use PGP on a multiuser system. There are just too many ways for someone to monitor your keystrokes, capture your pass phrase, and use your secret key.

pubring.pgp A file called pubring.pgp where you keep your public key and the public keys of the people to whom you want to send ciphertext. Let us understand how to add public key

John types the following command:

pgp mary.asc

PGP "reads" the file, notes that it is a public key, asks John if he wants to add it to the public key ring, and then asks a few more questions. (More on those later.)

(At this point you will not be able to "add" these keys because you already have them on you public keyring.) After Mary has added John's public key to her public keyring they are now ready to send PGP encrypted material back and forth. However, there is one way that Vinny or Judy could compromise the security of John and Mary's PGP keys. It involves a complicated switching of keys but it can be done. John and Mary must make sure that the public keys in their possession are actually the public keys of the person whose name appears in the user id.

Hope you get some idea from my article.

Add a comment
Know the answer?
Add Answer to:
Read the Pretty_Good_Privacy article. provide answers to the following questions: a) describe the private key files...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Go to the WCU Library and search the database for the following article. Read the article,...

    Go to the WCU Library and search the database for the following article. Read the article, and then answer the questions that follow: Soriano S., Alonso-Magdalena P., Garcıa-Arevalo M., Novials A., & Muhammed S. J. (2012). Rapid insulinotropic action of low doses of Bisphenol-A on mouse and human islets of langerhans: Role of estrogen receptor b. PLoS ONE 7(2): e31109. doi:10.1371/journal.pone.0031109 What are the causes of type 2 diabetes? What is the relationship between insulin resistance and hyperinsulinemia? What are...

  • Subject: parallel and high performance Computer. Provide the answers to the following questions: 1) Describe the...

    Subject: parallel and high performance Computer. Provide the answers to the following questions: 1) Describe the 3 categories of dependencies 2) Describe the 4 types of flow dependencies 3) Explain what is meant by a loop-carried dependency 4) Explain the difference between lexically forward and lexically backward and give an example of each.

  • network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] ||...

    network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] || E[KS, ZEM || E[PRа, H(M)]]] O None O E[PUB, Ks]||E[KS, Z(M)] O Z[M|| E[PRа, H(M)] Which of the following statement is true for the equation E[H[PI), PRI) in PGP? Public key of the sender is recovered by using hash of the passphrase Private key of the recipient is recovered in public key ring using hash of the passphrase Public key of the recipient is...

  • Read the questions below carefully and provide accurate, complete answers. Use extra paper if needed. (no...

    Read the questions below carefully and provide accurate, complete answers. Use extra paper if needed. (no herbivores or added nutrients), plants with herbivores only, and plants with added nutrients (herbivores still present). Given these results, describe what accurate conclusions can be drawn given the statistical differences represented. (3pts) Biomes (Dry weight) Control Herbivores Nutrients 2.) Compare and contrast the three different forms of selection. Give specific examples for each. (3pts) 3.) Define evolution and describe, in some detail, four different...

  • Read the Article posted below, then answer the followingquestions, Please fully answer the following questions...

    Read the Article posted below, then answer the following questions, Please fully answer the following questions about the case.(1000 words all together if possible)(typed no pictures)1) Perform a PESTEL analysis. This includes discussing the general environment factors affecting the beverage industry’s Performance such as economic, political/legal, socio-cultural, demographic, technological and global issues.2) Perform Porter’s five forces analysis on the beverage industry.3) Assess the beverage industry’s attractiveness in terms of growth and profitability. Specifically, present a comparative chart on the beverage...

  • Read the Article posted below, then answer the followingquestions, Please fully answer the following questions...

    Read the Article posted below, then answer the following questions, Please fully answer the following questions about the case.(1000 words all together if possible)(typed no pictures)1) Present a general overview of the US Beverage Manufacturing & Bottling industry. Specifically, discuss major trends, competitors, their products and relative market share.2) Perform a PESTEL analysis. This includes discussing the general environment factors affecting the beverage industry’s Performance such as economic, political/legal, socio-cultural, demographic, technological and global issues.3) Perform Porter’s five forces analysis...

  • This week we read chapter 7 and 8 and answer following questions. You can find answers...

    This week we read chapter 7 and 8 and answer following questions. You can find answers in your lecture notes as well as your textbook. - Do vitamins/minerals and water provide our bodies with any calories? yes or no --------&--- -- are MICRO NUTRIENTS WHEREAS --- --- IS A MACRO NUTRIENT -LIST"2" PRIMARY DIFFERENCES IN FAT SOLUBLE VS WATER SOLUBLE VITAMINS: - LIST "3" EXAMPLES EACH OF FAT SOLUBLE VITAMINS & WATER SOLUBLE VITAMINS - BRIEFLY LIST ROLE OF B...

  • help!!! Answer the following questions for the article that you will find based on the information...

    help!!! Answer the following questions for the article that you will find based on the information that you have been given. Answer in good depth and detail as appropriate. Use your text book, PowerPoints, class notes, InQuizitive, journal articles, and any other sources as appropriate. You may copy and paste the questions & answers into the required template at the end of the syllabus and place your answers directly below the questions in same size and font. Article #3 1....

  • 6.) Provide short answers for the questions about protein structure below: a.) True or False, amino...

    6.) Provide short answers for the questions about protein structure below: a.) True or False, amino acid sequence defines the native structure of protein. b.) What is the main type of bonding responsible for stabilizing the secondary structure of proteins? c.) Briefly discuss the thermodynamics of protein folding into its native 3D structure. Is this process enthalpy driven or entropy driven? d.) Give an example of 2 major secondary structural motifs found in polypeptides. Do any of these motifs appear...

  • Review Questions (1 to 2 paragraphs on each question) Describe top-down strategic planning. How does it...

    Review Questions (1 to 2 paragraphs on each question) Describe top-down strategic planning. How does it differ from bottom-up strategic planning? Which is usually more effective in implementing security in a large, diverse organization? What is the primary objective of the SecSDLC? What are its major steps, and what are the major objectives of each step? What questions might be asked to help identify and classify information assets? Which is the most useful question in the list What are the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT