Confidentiality and privacy - security, JAVA Programming

Assignment Help:

 

The confidentiality and privacy may be accomplished through encryption. Encryption may be:

Private-key or symmetric: This is based on a single key. This needs the sender and the receiver to share the same key. Both must have the key. The sender encrypts his code with a private key and the receiver decrypts the code with his own private key. This system is not suitable for large number of end users because it needs a key for every pair of individuals who require communicating privately.

Public-key infrastructure or asymmetric (PKI): This is relying on a pair of mathematically related keys. One is a public key, which is distributed to all the end users, and the other key is a private key, which is kept secretly hidden on the server. So this needs only two keys to talk to 1000 customers. This is also called Asymmetric encryption because the code encrypted by public key can only be decrypted by the private key and the code encrypted by the private key may only be decrypted by the public key.

 


Related Discussions:- Confidentiality and privacy - security

Explain ftp-telnet-voip and instant messaging, Write a brief note on each o...

Write a brief note on each of the following. FTP Telnet Instant messaging VoIP FTP: File Transfer Protocol: This protocol is used to upload and download the

Diffentiate local and global variables, Diffentiate Local and Global Variab...

Diffentiate Local and Global Variables? Local or function level variable effective just in the function in that they are declared although global variables visible everywhere o

Collection, how would I become expert in collection framework

how would I become expert in collection framework

Write an application for a video store , a. Write an application for a vide...

a. Write an application for a video store. Place the names of 10 of your favorite movies in a combo box. Let the user select a movie to rent. Let the user select a movie to rent. D

Concept of events and events listeners and events handlers, Question: (...

Question: (a) State and explain clearly FIVE new features of Actionscript 3.0 as compared to Actionscript 2.0. (b) Explain clearly the concept of events and events listen

JAVA Cipher Program, Cryptography, the study of secret writing, has been ar...

Cryptography, the study of secret writing, has been around for a very long time, from simplistic techniques to sophisticated mathematical techniques. No matter what the form howeve

What is the basic difference between threads and processes? , A process is ...

A process is an execution of a code but a thread is a single execution sequence within the process. A process may contain multiple threads. A thread is sometimes named a lightweigh

Illustrate an example of static variables, Illustrate an example of static ...

Illustrate an example of static variables System. out .println("some text"); -- out is a static variable JOptionPane. showMessageDialog (null, "some text"); -- showMessageDi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd