Unit 5 powerpoint
pptx
keyboard_arrow_up
School
Columbia Southern University *
*We aren’t endorsed by this school
Course
3301
Subject
Information Systems
Date
Dec 6, 2023
Type
pptx
Pages
8
Uploaded by briandjones127
SEC 3301-17B-5A19-S1, Security Application Development
Unit V PowerPoint Presentation
Brian Jones
25 April 2019
Introduction to PKI
Public Key Infrastructure
PKI Overview
PKI is a way for data and information to be transmitted securely by the use of two keys. The first is a public key. Which, as it’s name suggests, is available to anyone who wishes to use it to send encrypted data or information. The second is called the private key. This key is unique to the person receiving the data or information and is used to decrypt the message. By keeping the two keys separate, it ensures that the data being transmitted is not interfered with by an outside source. (Dubin, 2006)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How messages are sent using PKI
Assume you are trying to place an order or communicate with a website. You would access the website and select your items, place them in your cart, and checkout. Or send an email to inquire about your order status. By doing either of those actions, you are using the public key built into that website. The public key is there for anyone who attempts to access that site to use. Mail (2016
)
Cart (n.d.)
How messages are sent using PKI
The same system applies when you send encrypted information to a coworker or someone outside of the company who uses the same encryption method
. A public key is there immediately for your use. As soon as you transmit your information, a private key is generated that can only be used by the person you are corresponding with to open and decrypt the message.
How messages are received using PKI
As stated previously, as soon as data or information is transmitted, a private key is created that can only be used by the person receiving the information. This private key is used to “unlock” or decrypt the information being sent. By keeping this key private, it ensures that not everyone will be able to see the data.
Lock key body (n.d.)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How messages are received using PKI
The system is also highly beneficial when it comes to having a digital signature on a document. When the private key is used to decrypt the message, if there are any differences between the original and the decrypted copy, the recipient is notified that the document may have been tampered with.
Signature contract (n.d.)
References
Cart (n.d.). Retrieved from https://pixabay.com
Dubin, J. (2006, March). How PKI systems work. Retrieved from https://searchsecurity.techtarget.com/answer/How-PKI-systems-work
Lock key body (n.d.). Retrieved from http://4.bp.blogspot.com
Mail (2016, June 13). Retrieved from https://pixabay.com
Signature contract (n.d.). Retrieved from https://c.pxhere.com/photos/dd/cd/signature_contract_person_signing_a_document-1197862.jpg