Saturday, September 28, 2019
Public Key Infrastructure Case Study Example | Topics and Well Written Essays - 750 words
Public Key Infrastructure - Case Study Example It is an accretion of technology, set-up and practices that empower extensive scale utilization of public key cryptography to give validness, confidentiality integrity, and non-repudiation facilities. It offers certainty of value in data sent and received naturally and the source and end of the information. Information that contains a public key structure can be used as evidence before the court of law. Components of the public key infrastructure maintain a high security of emails and other information components of an organization. The structural functioning of public key infrastructure is that it utilizes digital signatures, digital certificates, encryption, certificate revocation, authorities, and storage when sending an email (Chapple & Ballad, 2014). The functions of public key infrastructure are significant in the current work of technology. Some of its functions are public key cryptography, certificate issuance, certificate validation and certificate revocation. Public key cryptography is the utilization of a pair of algorithmically interrelated cryptographic keys. In the event, that one key is utilized to encrypt data, and then just the related key can decode that data. If a person knows one of the keys, they can without much strain ascertain what the other one is. A public key that is exposed to numerous people, but a private key is made known to its owner who upholds its secrecy and integrity strictly. Therefore, in a public system, it is important for one to have both the public key and the corresponding private key. The significance of the private key is that it enables one to prove who they claim to be. Public key cryptography is being applied in, amongst others, the IT security discipline data security. Data safety is c oncerned with all elements of securing electronic data resources against security threats. Public key cryptography is utilized as a system for guaranteeing the privacy, legitimacy and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.