The purpose of the research paper is to give a thorough survey of the Algorithms of Asymmetric Cryptography and Public Key Infrastructure. Items that should be addressed include, but are not limited to: Asymmetric Cryptography Description of each algorithm Types: Encryption Digital Signature Hashing Function Key Distribution Strengths/weaknesses of each algorithm Relevant examples of modern applications/industry that utilize each algorithm Public Key Infrastructure Define Discuss the components How is it used with asymmetric cryptography.
Research Paper: Minimum of 1,250 words / Maximum 1,400 words (Double spaced ) APA style At least 6 works cited At least 3 of your references have to be scholarly peer-reviewed articles
encryption Cryptography Public Key infrastructure Hashing Functions
book Cryptography InfoSec Pro Guide
Answer preview………… Asymmetric cryptography has been identified as central to facilitating secure communication, especially over insecure networks. This paper focuses on the fundamentals of asymmetrical cryptography including the process of encryption-decryption, the common algorithms used, operations in the asymmetrical cryptography processes, and the public key infrastructure (PKI). Regarding the algorithms, RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC) are identified and their processes briefly discussed. The components of PKI including the CA, RA, CMS, central repository, and certificate policy are discussed with emphasis laid on the importance of the CMS in managing certificates. Primarily, this research paper shows that encryption using the asymmetrical methods is crucial in network security as secure message exchange over insecure networks such as the internet is possible through the public and private pair of keys that users have………
APA 2072 words Added to cart