Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Public Key Infrastructure vs. Pretty Good Privacy, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
PKI
Public Key Infrastructure, or simply ‘PKI’, is “A framework for creating a secure method for exchanging information based on public key cryptography” (PC Magazine). This solution helps the users of a basically unsecured network, like Internet, be able to send and receive data and money by means of a pair of a private and public cryptographic code, provided by a securitized agency or organization. The public key organization establishes a data base of certificates, which has an ability to identify an individual or a corporation by means of withdrawing the digital certificates. It is assumed that the public key cryptography is the most commonly used way to authenticate messages and information processed by means of the Internet. The general disadvantages of the method is that if the secret public key is stolen or intercepted by someone outside of the company, all the letters and messages can be easily decrypted and read. Public Key Infrastructure consists of the authorizing body that issues and verifies the digital certificates, a registration authority, which verifies the user before granting the certificate, the certificate database, and the managing system. The advantages of the system include the following key factors: the public and private keys are made concurrently by the authorization party and distributed only to the potential users of the directory; the key is never shared with anyone else, except for the clients of the directory, ability to encrypt outcoming and decrypt incoming messages using your own private key; opportunity to authenticate messages to people for them to make sure the messages is really coming from you.
Advantages: accessibility from anywhere; key intelligibility; low-price
Disadvantages: lack of local support; private and public keys stored in the same place; considerably slow; reliance on someone’s server
PGP
Pretty Good Privacy, abbreviated ‘PGP’, is “Widely used data encryption software that ensures integrity, security, and privacy of data and messages sent over the internet” (Business Dictionary). Basically, it is a specialized security program that helps protect email messages. It can also be used to electronically sign a document, in order for the receiver to be sure that the message was not opened or changed on its way. According to some sources, Pretty Good Privacy is the most commonly used software for this kind of technical operation, due to its free availability in the Internet. The system is based on the private key standard. The software is beneficial for the following reasons: the message is encrypted by the sender using the public key; use of fast algorithm for encrypting certain parts of the message instead of a time-consuming total encryption. The receiver has to use a private key to decrypt a short key and, afterwards, uses this gained key to decrypt the whole message. For the digital signature feature, the program uses a mathematic code, called the ‘hash code’, which creates an algorithm from the users name and is sent together with the sender’s private code.
Advantages: local back up; independence from other servers; personal key management; considerably fast
Disadvantages: requirement for your personal key to decrypt emails; fee for commercial use; general public license configuration
Reference
PC Magazine. (2008). Public Key Infrastructure. Retrieved March 7, 2009, from http://www.pcmag.com/encyclopedia_term/0%2C2542%2Ct%3DPKI&i%3D49333%2C00.asp
Business Dictionary. (2009). Pretty Good Privacy. Retrieved March 7, 2009, from http://www.businessdictionary.com/definition/pretty-good-privacy-PGP.html
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee