Asymmetric Cryptography

The purpose of the research paper is to give a thorough survey of the Algorithms of Asymmetric Cryptography and Public Key Infrastructure. Items that should be addressed include, but are not limited to: Asymmetric Cryptography Description of each algorithm Types: Encryption Digital Signature Hashing Function Key Distribution Strengths/weaknesses of each algorithm Relevant examples of modern applications/industry that utilize each algorithm Public Key Infrastructure Define Discuss the components How is it used with asymmetric cryptography.

 

Research Paper: Minimum of 1,250 words / Maximum 1,400 words (Double spaced ) APA style At least 6 works cited At least 3 of your references have to be scholarly peer-reviewed articles

 

REQUIREMENTS

encryption  Cryptography  Public Key infrastructure  Hashing Functions

book Cryptography InfoSec Pro Guide

Answer preview………… Asymmetric cryptography has been identified as central to facilitating secure communication, especially over insecure networks. This paper focuses on the fundamentals of asymmetrical cryptography including the process of encryption-decryption, the common algorithms used, operations in the asymmetrical cryptography processes, and the public key infrastructure (PKI). Regarding the algorithms, RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC) are identified and their processes briefly discussed. The components of PKI including the CA, RA, CMS, central repository, and certificate policy are discussed with emphasis laid on the importance of the CMS in managing certificates. Primarily, this research paper shows that encryption using the asymmetrical methods is crucial in network security as secure message exchange over insecure networks such as the internet is possible through the public and private pair of keys that users have………

APA 2072 words Added to cart

 

Doing a similar assignment? Save your time and hire our Genuine Essay Writers to do your task. Get 15% Discount on your 1st order. Use code: FREE15