Professional Documents
Culture Documents
Case
Case
Case
Professor Richardson
Room 314
09/11/19
Lab 4 - Encryption
Look up information on the uses of public key encryption for sending secure message and for
creating secure electronic “signatures.” Describe how keys are distributed and used for these
purposes.
The Public key encryption is validated to be safe only when the sender of an enciphered
public key used for encryption belongs to the correct person they are trying to send the
message to.
Secured electronic signatures are only possible when the signer gives the private key,
aka personal signature. After the digital signature has been written by the signer, the
mathematical algorithm ciphers the signature; or the “Private key”. If the signature is a
match, then the transference between the data will then be successfully validated.
However, if the private key is invalid; then the data will not be transferred due to it
requiring a consistent private key in order to follow through with the process.
The Public key is openly distributed, by which it needs validation from signers with