Explore BrainMass
Share

security: assymetric encryption algorithm

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Discuss how the asymmetric encryption algorithm can be used to achieve the following goals:

a) Authentication: the receiver knows that only the sender could have generated the message.
b) Secrecy: only the receiver can decrypt the message.
c) Authentication and secrecy: only the receiver can decrypt the message, and the receiver knows that only the sender could have generated the message.

© BrainMass Inc. brainmass.com October 25, 2018, 8:27 am ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/security-assymetric-encryption-algorithm-540934

Solution Preview

Assymetric encryption can be done through PKI (Public Key Infrastructure). An application PKI encryption is that of digital signature schemes. Digital signature schemes can be used for sender authentication and non-repudiation. A user who wants to send a message creates a digital signature for this message, and then sends this digital signature (together with the message) to the intended receiver. Digital signature schemes have the property that signatures can be computed only with the knowledge of the correct private key. To verify that a message has been signed by a user and has not been modified, the receiver needs to only know the corresponding public key. ...

$2.19
See Also This Related BrainMass Solution

Historical and Statistical Logging, File Security and Firewalls

I need the following explained in about 2 paragraphs each the difference between the each of these entities.
@ Historical and statistical logging
@ File security and firewalls
@ Secret and public keys
@ Symmetric and asymmetric keys
@ Digital certificate and digital postmark

View Full Posting Details