Case

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Mikel Ingram

Professor Richardson

Room 314

09/11/19

Lab 4 - Encryption

Look up information on the uses of public key encryption for sending secure message and for

creating secure electronic “signatures.” Describe how keys are distributed and used for these

purposes.

The Public key encryption is validated to be safe only when the sender of an enciphered

public key used for encryption belongs to the correct person they are trying to send the

message to.

Secured electronic signatures are only possible when the signer gives the private key,

aka personal signature. After the digital signature has been written by the signer, the

mathematical algorithm ciphers the signature; or the “Private key”. If the signature is a

match, then the transference between the data will then be successfully validated.

However, if the private key is invalid; then the data will not be transferred due to it

requiring a consistent private key in order to follow through with the process.

The Public key is openly distributed, by which it needs validation from signers with

private keys. The Private is strictly only known by the signer.

You might also like