Confidentiality and privacy - security, JAVA Programming

Assignment Help:

 

The confidentiality and privacy may be accomplished through encryption. Encryption may be:

Private-key or symmetric: This is based on a single key. This needs the sender and the receiver to share the same key. Both must have the key. The sender encrypts his code with a private key and the receiver decrypts the code with his own private key. This system is not suitable for large number of end users because it needs a key for every pair of individuals who require communicating privately.

Public-key infrastructure or asymmetric (PKI): This is relying on a pair of mathematically related keys. One is a public key, which is distributed to all the end users, and the other key is a private key, which is kept secretly hidden on the server. So this needs only two keys to talk to 1000 customers. This is also called Asymmetric encryption because the code encrypted by public key can only be decrypted by the private key and the code encrypted by the private key may only be decrypted by the public key.

 


Related Discussions:- Confidentiality and privacy - security

War file for your application that can be deployed on tomcat, Deliverable: ...

Deliverable:  1) WAR file for your application that can be deployed and run on TomcaT (War file must contains the Java source code) Requirement for application: 1. Application m

Program, Write a program called Power that displays the positive powers of ...

Write a program called Power that displays the positive powers of 2. When the user enters the exponent at a prompt, the program displays 2 to that power. The program halts when the

Cross platform stock market game, Cross platform stock market game Proje...

Cross platform stock market game Project Description: I want someone to develop a simple stock market game. This will mainly be a facebook and android app, face book being mo

Java server faces - eagro portal project, eAgro Portal Project: Techno...

eAgro Portal Project: Technology Used: Java Server Faces, JSR 168 Specification, Websphere Portal Server5.0, DB2 database And Rational Application Developer, Jasper Report Too

Why you don''t need to import java.lang.*, Why You don't need to import jav...

Why You don't need to import java.lang.* There is one exception to the import rule. All classes in the java.lang package are imported by default. Therefore you do not required

Java, 1. Which of the following are not valid Java identifiers, and why? (...

1. Which of the following are not valid Java identifiers, and why? (a) wolVes (b) United(there is only one) (c) 87 (d) 5 3 (e) Real ale (f) isFound?by 2. A class Television

Describe the life cycle methods of a jsp? , 1. Pre-translated: Before the...

1. Pre-translated: Before the JSP file has been compiled and translated into the Servlet. 2. Translated: The JSP file has been compiled and translated as a Servlet. 3. I

Design a payroll system, For your project, you will be designing a payroll ...

For your project, you will be designing a payroll system for a company. The company will use the system to generate payroll reports based on different kinds of employees in the com

Plug-in for adobe after effects, Plug-in for Adobe after Effects Project...

Plug-in for Adobe after Effects Project Description: We are seeking software engineers to create a plug-in for Adobe after Effects (CS4 and above) that allows 3D extrusions f

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd