Unit 5 powerpoint

pptx

School

Columbia Southern University *

*We aren’t endorsed by this school

Course

3301

Subject

Information Systems

Date

Dec 6, 2023

Type

pptx

Pages

8

Uploaded by briandjones127

Report
SEC 3301-17B-5A19-S1, Security Application Development Unit V PowerPoint Presentation Brian Jones 25 April 2019
Introduction to PKI Public Key Infrastructure
PKI Overview PKI is a way for data and information to be transmitted securely by the use of two keys. The first is a public key. Which, as it’s name suggests, is available to anyone who wishes to use it to send encrypted data or information. The second is called the private key. This key is unique to the person receiving the data or information and is used to decrypt the message. By keeping the two keys separate, it ensures that the data being transmitted is not interfered with by an outside source. (Dubin, 2006)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
How messages are sent using PKI Assume you are trying to place an order or communicate with a website. You would access the website and select your items, place them in your cart, and checkout. Or send an email to inquire about your order status. By doing either of those actions, you are using the public key built into that website. The public key is there for anyone who attempts to access that site to use. Mail (2016 ) Cart (n.d.)
How messages are sent using PKI The same system applies when you send encrypted information to a coworker or someone outside of the company who uses the same encryption method . A public key is there immediately for your use. As soon as you transmit your information, a private key is generated that can only be used by the person you are corresponding with to open and decrypt the message.
How messages are received using PKI As stated previously, as soon as data or information is transmitted, a private key is created that can only be used by the person receiving the information. This private key is used to “unlock” or decrypt the information being sent. By keeping this key private, it ensures that not everyone will be able to see the data. Lock key body (n.d.)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
How messages are received using PKI The system is also highly beneficial when it comes to having a digital signature on a document. When the private key is used to decrypt the message, if there are any differences between the original and the decrypted copy, the recipient is notified that the document may have been tampered with. Signature contract (n.d.)
References Cart (n.d.). Retrieved from https://pixabay.com Dubin, J. (2006, March). How PKI systems work. Retrieved from https://searchsecurity.techtarget.com/answer/How-PKI-systems-work Lock key body (n.d.). Retrieved from http://4.bp.blogspot.com Mail (2016, June 13). Retrieved from https://pixabay.com Signature contract (n.d.). Retrieved from https://c.pxhere.com/photos/dd/cd/signature_contract_person_signing_a_document-1197862.jpg