Confidentiality and privacy - security, JAVA Programming

Assignment Help:

 

The confidentiality and privacy may be accomplished through encryption. Encryption may be:

Private-key or symmetric: This is based on a single key. This needs the sender and the receiver to share the same key. Both must have the key. The sender encrypts his code with a private key and the receiver decrypts the code with his own private key. This system is not suitable for large number of end users because it needs a key for every pair of individuals who require communicating privately.

Public-key infrastructure or asymmetric (PKI): This is relying on a pair of mathematically related keys. One is a public key, which is distributed to all the end users, and the other key is a private key, which is kept secretly hidden on the server. So this needs only two keys to talk to 1000 customers. This is also called Asymmetric encryption because the code encrypted by public key can only be decrypted by the private key and the code encrypted by the private key may only be decrypted by the public key.

 


Related Discussions:- Confidentiality and privacy - security

Design a game in java, Ten pigs were all in a pen, enjoying their morning s...

Ten pigs were all in a pen, enjoying their morning slop when a bird flew down from a nearby tree and began picking all the best bits out from the trough. This greatly perturbed the

Java rmi client implement and web service client-side steps, What is the na...

What is the name of the services you have chosen? What do they do? What is the name of the publisher? Provide details if you are developing your own service(s). There are variou

Overloading method, QUESTION 3: Overloaded methods Write the overloaded me...

QUESTION 3: Overloaded methods Write the overloaded method named average () for each of the following problems: a) The first method receives THREE (3) integer values and returns

Program, write code employe managment

write code employe managment

Difference between bean factory and application context, On the surface, an...

On the surface, an application context is similar as a bean factory. But application context offers much more.. ? Application contexts give a means for resolving text messages,

Define object lock and which kinds of object have locks, What do you think ...

What do you think about an object's lock and which kinds of object's have locks?

Websphere - weblogic, WebSphere - Weblogic and Apache: Building/Ins...

WebSphere - Weblogic and Apache: Building/Installation  and maintenance of Solaris and Linux machines. Exposure to Sun Hardware : Sunfire v880,v890.V440,X4600

Give the example of using a class from the class library, Give the example ...

Give the example of Using a class from the class library ? You use the java.net.URL class only like you'd use any other class along with these methods in which happens to be n

Assistance for json authentication problem rss/aol/android, Assistance for ...

Assistance for JSON authentication problem RSS/AOL/Android The key problem we face is how to authenticate afterward the user logged in the webview as well as then parse the JSON

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd