Introduction To Public Key Infrastructure Essay

2054 words - 8 pages

In today's information age, the internet transaction is a prevalent phenomenon that benefits the business world a lot and makes our lives much easier. However, with the increasing extensive use of the internet, security issue becomes the biggest concern to people. Internet transmitted information regarding business secrets or people's privacy is highly vulnerable. The urgent needs for security safeguard have given birth to PKI, an emerging technology of Public Key Infrastructure. PKI is a comprehensive method used to secure the electronic transmissions over the internet. Its development has dramatic economic influences and it is considered a competitive advantage to maintain prosperity in the business environment. The importance and popularity of PKI technology lies upon its ability to allow users from corporate, government, and consumer sectors to take advantage of the convenience internet provides, meanwhile to safeguard transmitted information from being intruded or disturbed. In the following discussion, the paper will mainly explore the nature of this new technology, its pros and cons, and it will also develop guidelines to evaluate and implement PKI.ANALYSIS of PKIWith the development of the Internet, people are more and more concerned about the security of information transferred by this technology. An emerging technology called Public Key Infrastructure (PKI) was created by Whitfield Diffie and Martin Hellman in 1976 and developed later by Ron Rivest, Adi Shamir, and Len Adleman to meet this demand. "PKI is a scheme based on public and private key cryptography and digital signatures. Users can use these digital signatures to electronically encode and decode information in a secure way on the Internet" (Evans & Yen, 2005) PKI users can enjoy 4 benefits: privacy, confirmation, integrity, and identity. Privacy ensures that the information transferred cannot be seen by a third party. Confirmation makes sure senders or receivers cannot deny their involvement in the electronic transaction. Integrity guarantees that receivers receive the same information sent by senders. Identity verifies the identity of the senders and the receivers.But how PKI functions? Senders and receivers need digital certificates issued by Certification Authorities. A digital certificate confirms its holder's unique computer identity and provides his/her private and public key. The public key is known by everyone while the private key is secret and known only to the user. Before sending messages, the software on a sender's computer creates a digital signature (by using his private key), and encrypt the messages (by using a receiver's public key). When receiving the digitally signed and encrypted messages, the receiver uses his private key to decrypt the messages. Since only the receiver's private key can decrypt messages encrypted with his public key, the confidentiality of the document is confirmed. Confirmation, integrity, and identity are also assured because...

Find Another Essay On Introduction to Public Key Infrastructure

Identifying the Channels Between Public Expenditure in Core Infrastructure and Private Investment

856 words - 3 pages Abstract The purpose of this paper is to identify the channels between the public expenditure in core infrastructure and private investment. Profitability and lack of financial constraints considered as the major effects for corporate investment. For this purpose a large panel data of US firms as well as the economic results of the majority of the states. The results show that the infrastructure affect the costs and the revenues of the firms

Green City Clean Water Program Essay

1802 words - 7 pages ecology, economics, and equity. The vision includes large-scale implementation of green stormwater infrastructure to manage runoff at the source on public land and reduce demands on sewer infrastructure. In addition, requirements and incentives for green stormwater infrastructure to manage runoff at the source on private land and reduce demands on sewer infrastructure. Increased access to and improved recreational opportunities along green and

The Relationship Between Public Capital and Economic Activity

1855 words - 7 pages . Three sector wise aggregates were considered in the study viz., non-agricultural sectors, all economic sectors and manufacturing. Public capital and Labour were found to be complementary inputs with diminishing returns. Some of the later studies by Duffy-Deno and Eberts (1989), Eberts (1986, 1990), and Eisner (1991) were also conducted at the regional level. All these studies found a positive relationship between infrastructure and economic growth

Importance of Cyber Security

2012 words - 8 pages & Stever, 2011). The introduction of Cold War logic was conceptualized to solve cybersecurity concerns and the reliance of bottom-up policy. The public-private partnership was notably the cornerstone to cyberspace security strategy. In 2004, congress created the Intelligence Reform and Terrorism Prevention Act during George W. Bush’s second term. Board members had no fixed tenure and the board had no subpoena power therefore no requirements for


1013 words - 5 pages INTRODUCTION 1.1. Background of Study The existing of various risks and financial limitation always holds the government back during initiating new infrastructure projects. Therefore, it is important for developing country like Malaysia to practice PPP as it can help the government to save resources by share the risks to the private sector for unfamiliar projects (Hodge & Greve, 2007). In general, there are two significant advantages of

The Concentration of Economic Power in the Public Sector Undermines the Foundations of Economic Growth

2300 words - 9 pages sector, and these were indicators of strong economic growth. With the revenue generated from manufacturing, state control of funds allowed the government to best use the funds to expand economic growth. Infrastructure was rapidly developed and improved and the foundations for economic growth were built up. The public sector was responsible for the managing of key infrastructure and services and this included

Public Health versus Medical Care

1279 words - 5 pages outcomes but alignment of incentives has not advanced as quickly as the need would dictate. Public Health thus evolved in ways that are focused on the population at large, with the following key responsibilities, noted by Sommers & Heiser (2013): 1. Monitor health status to identify and solve community health problems. 2. Diagnose and investigate health problems and health hazards in the community. 3. Inform, educate, and empower people about

State and Non-state Actors that Pose the Greatest Cyber Threat to the United States

2253 words - 10 pages predominately commercial space. (Clemente, 2013). Subsequently, policy and decision-making isn’t in the hands of the government only, but the private and public sectors that are notably interlinked. These global interoperabilies are redefining what establishes a critical infrastructure and forces policy makers to look at physical, logical, and social connections. (Clemente, 2013). Critical infrastructure planning is what federal law makers’ use as a

Cloud Computing

1669 words - 7 pages 1. Cloud Computing Cloud computing is becoming one of the key words of the IT industry. The cloud is a metaphor for the Internet or infrastructure of communication between the architectural components, based on an abstraction that hides the complexity of infrastructure. Each part of this infrastructure is provided as a service and they are normally allocated in data centres, using hardware shared computing and storage (Buyya et al. 2009b). To

Cloud Computing: Email and Storage Services

3759 words - 15 pages This paper is intended for the purpose of providing the CIO with the information needed to make a decision whether or not to implement cloud services into our network infrastructure. Information is provided on the types of cloud services available, the vulnerabilities, strengths and weaknesses, email and storage providers, and the recommendation of the research team.   Introduction The Defense Advanced Research Project Agency (DARPA

Uniting Business And It

811 words - 3 pages dynamic business opportunities. In this paper,we explore new concepts, techniques and methodologies in solution architecture used to create an atmosphere of cooperation. Through this atmosphere of cooperation, we unite business and IS/IT, enabling the IT applications and infrastructure to be strategic weapons that increase business performance. Introduction Enterprises are increasing their dependence on their information applications and

Similar Essays

Privacy What About It? ... A Comprehensive And Easy To Understand Overview Of Public Key Cryptography And The Main Tool To Apply It: Pretty Good Privacy.

5283 words - 21 pages through the process of generating a new key pair. Although you probably realized that these keys have some importance, you might not realize that these keys are the ins and outs of PGP.You generate a key-pair; a private and a public key. The private key you must absolutely keep to yourself, but the public key is just what its name applies; public! This scheme sound somewhat strange - I mean, the whole idea of cryptography and exncryption would be

Human Relations: The Key To Personal Growth And Career Success. This One Is Written In Outline Form, Can Be Formatted As A Powerpoint Presentation, A Public Speaking Presentation Or An Essay.

792 words - 3 pages Human RelationsThe Key to Personal Growth and Career SuccessHuman RelationsIntroduction to Human RelationsThe Nature, Purpose, and Importance of Human Relations1)The nature of human relations, its development, and its importance to the achievement of individual and organizational goals.Human Relations Defined1) The Term Human Relations in it's broadest sense covers all types of interactions among people--their conflict, cooperative efforts, and

Network Neutrality: Protecting The Future Essay

1677 words - 7 pages proposed internet plan. The best way to ensure net neutrality for the short-term future is for the FCC to reclassify the internet as a public utility, and ISPs as Title II “common carriers”. If you believe this to be true, you can contact your local representative to make sure net neutrality is here to stay. However, for the services we use on the internet to be able to grow and evolve, our nation’s infrastructure must be improved. You can advocate

Repairing Massachusetts' Infrastructure Essay

1901 words - 8 pages , public utilities, and bridges, by raising the standards, properly funding projects, and planning and designing the infrastructure itself. Can Massachusetts repair its quickly crumbling infrastructure, including public transportation, public utilities, and bridges within the next decade? Introduction to the Industry The infrastructure of Massachusetts, though it is not the worst in the country, is in desperate need of attention. The