Sample Essay on:
Public-Key Cryptography

Here is the synopsis of our sample research paper on Public-Key Cryptography. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3 page paper provides an overview of public key cryptography. A section on positive and negative aspects of this type of cryptography are included. Bibliography lists 4 sources.

Page Count:

3 pages (~225 words per page)

File: RT13_SA923key.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

with the public version ("How PGP works," 2009). That is, the programmer publishes the public key but the private key passwords are never divulged ("How PGP works," 2009). Hence, anyone who has a copy of the pubic key will be able to encrypt information, but that input can only be read by the individual with the private key ("How PGP works," 2009). Public key cryptography can be used for a number of purposes. The information is safeguarded but the public is able to access certain areas with the use of the public key. As with any type of cryptography, there are positive and negative aspects of using the public key type. II. Positive and Negative Aspects of Public Key Cryptography Public-key systems are certainly advantageous over symmetric algorithms, for example, because there does not have to be a common key that is used by both the receiver and the sender ("Public key cryptography," 2009). The advantage of this system is that it is secure and it allows access by the public, but it does not compromise security. How is this accomplished? The public key is relatively easy to compute, but the public key cannot derive the private key very easily ("Public key cryptography," 2009). Hence, the private key information is safeguarded. Even when sophisticated mechanisms are used, it could take months to compute a private key from a public key ("Public key cryptography," 2009). One can see clear advantages and another one is reported as follows: "...unlike symmetric algorithms, public-key systems can guarantee integrity and authentication, not only privacy" ("Public key cryptography," 2009). These are solid systems. However, a primary disadvantage when using these types of systems is that they are not as quick as symmetric algorithms ("Public key cryptography," 2009). Another disadvantage is key size ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now