Question

describe the various steps included in the encryption and identification process. This process should include minimally...

describe the various steps included in the encryption and identification process. This process should include minimally include the handshake process (see video), key exchanges, how encryption technique are agreed upon, and the use of certificates and public keys. This topic should also address the public key infrastructure.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Before moving to Steps of Encryption we first know what ios encryption. Encryption is a process of conversion of any data that can't be used or understood by anyone until it decoded or say decrypted. any person or corporation have highly sensitive data which they don't want to release or leaked or anyone can get. so they use encryption to encode their sensitive data in non readable format so if anyone get their data directly or indirectly can't be able to understand. When you encrypt something, the computer will ask you to set a password. After that, no one will be able to get the data unless they have the password. so in other words This is a process of encoding data to prevent unauthorized person from viewing or modify it.

Steps Involving in Encryption of data.


Step 1: Key generation
There are two types of keys for identification of the data called as

  • Private Keys
  • Public Keys

These keys are mostly generated by product of huge prime numbers. these keys are of 512 bits long. The current nationally recommended length of key is 2048.

Step 2: Key Exchange

In this step the computers exchange public keys with each other on a reliable network using TCP/IP. but for security reason they never exchange Private keys.

Step 3: Encryption.

The Sending computer encrypt the secter data with the help of recieved Public keys and doing some mathematical operation. these mathematical operation are so complex i.e. computer can't reverse the process of encryption even public key can't be used for decryption.

Step 4: Sending encrypted data

Now the sender computer send the encrypted data through a network like internet.

Step 5: Decryption

Now the receiver can decrypt the message, using their private key. That's the only key in the world that can be used to decrypt the data.

The whole process of Encrytion and decryption is known as cryptography. the public key certificate is also known as the digital certificate or identity certificate which have the information of public key in the form of electronic document and it is use to show the ownership of public key. apart from the public key the digital certificate have the information of owner and the digital signature of it.

these digital signature and the information of user is used by computer to encryprt the data for specific user or machine. these certificate are generated and issued by a web trust which is certificate authority. it charge costomer for issuing certificate for them. this key certificate generation and distribution structure is well known as public key infrastructure.

Add a comment
Know the answer?
Add Answer to:
describe the various steps included in the encryption and identification process. This process should include minimally...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. List some of the various communities to which you belong (organizations, work, hobbies, fields of...

    1. List some of the various communities to which you belong (organizations, work, hobbies, fields of expertise, family). Give examples of some of the behavioral and language characteristics particular to each group? For instance, do you speak to your job supervisor in the same way you speak to your child or your best friend? Why might you interact with members of different communities differently?    2.What are some of your past experiences with writing? Please explain what you like and...

  • HEA 285 Wellness Project Guide Sheet The wellness project focuses on the process of changing personal behavior. Th...

    HEA 285 Wellness Project Guide Sheet The wellness project focuses on the process of changing personal behavior. The primary focus is the PROCESS of behavior ou e comfortable working with and sharing with your instructor. Please see your this project. Objective: The purpose of the wellness projet is to 1. Demo nstrate knowledge of lifestyle behaviors that promote wellness & reduce the risk of illness, injury. and disease 2. Demonstrate responsible decision making skillsfor the enhancement of individual Steps to...

  • Here is the data analysis project, please I need an excellent project, it is due 4 hours! Statist...

    here is the data analysis project, please I need an excellent project, it is due 4 hours! Statistics course. GENERAL DESCRIPTION For the data analysis project, you address some questions that interest you with the statistical methodology we learn in MAT 235.   You choose the question; you decide how to collect data; you do the analyses. The questions can address almost any topic (although I have veto power), including topics in economics, psychology, sociology, natural science, medicine, public policy, sports,...

  • Read and Complete Case Study #2 –Managing People. The central components of your analysis should include issue identific...

    Read and Complete Case Study #2 –Managing People. The central components of your analysis should include issue identification, issue analysis, solutions, and potential limitations to your solutions. The case analyses serve to: a) Provide an opportunity to apply the class concepts in the solution of practical problems. b) Provide you with a common task through which you can learn to be more effective thinkers and problem-solves in your organizations. The written case analysis will be evaluated based on your effectiveness...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • 1. What are the objectives of the Chipotle ad (page 579)? Does the ad have more...

    1. What are the objectives of the Chipotle ad (page 579)? Does the ad have more than one objective? MEAT, NO PRESCRIPTION NEEDED. Chipotle rice.com NO ADDED HORMONES OR ANTIBIOTICS IN ARIZONA CHANDLER FASHION CENTER NEXT TO HARKINS THEATRE San Tan Signs Then it comes down to it, what is the point of advertising? Generally we think that its goal is to get someone-normally the person receiving the ad-to do some thing and that something is nearly always a purchase...

  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT