Purchase Solution

Public and Private Messages in online Communication

Not what you're looking for?

Ask Custom Question

Hi, I need some assistance on the following questions:
1. What characteristics would make an encryption absolutely unbreakable? What characteristics would make an encryption impractical to break?
2. Obama and Romney want to share a secret and they do not want the message to be deciphered during communications. Would they use a public or private key when sending the message?
3. What role do technologies such as encryption play in protecting privacy?
4. Describe the process within public key systems if you want to support non-repudiation and securing the message.

Purchase this Solution

Solution Summary

The solution gives importance to data encryption when transmitting communication online to ensure privacy.

Solution Preview

1. Although many believed that there is no such thing as unbreakable encryption. This conclusion was based on the encryption technology of the 1940's. The Germans had their enigma encryption machine believed to be unbreakable at the time. Then the Allies acquired one and started to decrypt messages after messages coming from the German side. But technology has changed. Scientists now utilize unconventional encryption tools with the use of the power of light particles.

Imai and Hayashi (2006) suggested that "the most powerful form of encryption is not necessarily made of impenetrable elements, but instead photons (or particles of light) of which properties change when handled".

They noted that that encryption codes can be made safe through the use of quantum properties, such as atoms and photons. Quantum cryptography, they believe, will be the answer to the security risks that will inevitably arise with the development of quantum computers. Once quantum computers are put into use, private keys will become obtainable through public keys, and the public key distribution system will no longer be an option. The only way to send uncrackable messages will be with a private key distribution system using the same quantum aspects as quantum computers themselves. There is another mysterious quantum property in addition to superposition: an original quantum state breaks down when observed. This means that the very act of listening in will break the key itself, alerting the sender and recipient to the unwanted eavesdropper's presence.

Rash (2012) corroborated this idea by mentioning that information can be encoded on individual photons. These encoded photons can be sent to a receiver that can measure their characteristics ...

Purchase this Solution


Free BrainMass Quizzes
Marketing Management Philosophies Quiz

A test on how well a student understands the basic assumptions of marketers on buyers that will form a basis of their marketing strategies.

Income Streams

In our ever changing world, developing secondary income streams is becoming more important. This quiz provides a brief overview of income sources.

Situational Leadership

This quiz will help you better understand Situational Leadership and its theories.

Cost Concepts: Analyzing Costs in Managerial Accounting

This quiz gives students the opportunity to assess their knowledge of cost concepts used in managerial accounting such as opportunity costs, marginal costs, relevant costs and the benefits and relationships that derive from them.

Team Development Strategies

This quiz will assess your knowledge of team-building processes, learning styles, and leadership methods. Team development is essential to creating and maintaining high performing teams.