¶ … Symmetric Encryption and Asymmetric Encryption Technology
On the VM (virtual machine) in the university virtual lab, there consists a folder named "c:encrypt." The folder consists of two files:
img.jpg, and "encrypt.exe -- encrypt and decrypt key."
This paper decrypts the picture to view the text hidden in the picture.
Objective of this project is to discuss the encryption technology strategy used for the software application.
Encryption Technology Strategy used for the Software Application
In the IT (information technology) environment, the symmetric encryption and asymmetric encryption technology are used to encrypt and decrypt a text or message. However, the asymmetric is the encryption technology used to encrypt the text inside the img.jpg file. The asymmetric encryption uses the two keys for the asymmetric cipher, and the two keys consist of a private and public key. In essence, the public key is available for everybody where the private key is only known to the owner. In the case of img.jpg, the file is encrypted with public key, however, the private key is known only known to the owner. One of the benefits of the asymmetric cipher is that it is able to solve the problem of secure key distribution, which is one of the problems of symmetric encryption. (Delfs, & Knebl 2007).
The case of asymmetric encryption is different, anybody can use the public key to encrypt the text, however, only the owner of the file can use the private key to decrypt the text. In the case of img.jpg file, the file is encrypted with the public key because when a user runs the encrypt.exe on the file, the encrypted text will come out. The asymmetric chipper is able to solve the problem associated to scalability since everyone will require one private key and one public...
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Much work remains to enable a seamless Integration, for example that can extend IP to support mobile network devices. (Chlamtac, Conti, and Liu, 2003) 4G is stated to begin with the assumption "that future networks will be entirely packet-switched, using protocols evolved from those in use in today's Internet." (Chlamtac, Conti, and Liu, 2003) It is reported that a 4G wireless network that is all IP-based "has intrinsic advantages over its
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now