Here is the synopsis of our sample research paper on Public-Key Cryptography. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper provides an overview of public key cryptography. A section on positive and negative aspects of this type of cryptography are included. Bibliography lists 4 sources.
Page Count:
3 pages (~225 words per page)
File: RT13_SA923key.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
with the public version ("How PGP works," 2009). That is, the programmer publishes the public key but the private key passwords are never divulged ("How PGP works," 2009). Hence, anyone
who has a copy of the pubic key will be able to encrypt information, but that input can only be read by the individual with the private key ("How PGP
works," 2009). Public key cryptography can be used for a number of purposes. The information is safeguarded but the public is able to access certain areas with the use of
the public key. As with any type of cryptography, there are positive and negative aspects of using the public key type. II. Positive and Negative Aspects of
Public Key Cryptography Public-key systems are certainly advantageous over symmetric algorithms, for example, because there does not have to be a common key that is used by both the
receiver and the sender ("Public key cryptography," 2009). The advantage of this system is that it is secure and it allows access by the public, but it does not compromise
security. How is this accomplished? The public key is relatively easy to compute, but the public key cannot derive the private key very easily ("Public key cryptography," 2009). Hence, the
private key information is safeguarded. Even when sophisticated mechanisms are used, it could take months to compute a private key from a public key ("Public key cryptography," 2009). One can
see clear advantages and another one is reported as follows: "...unlike symmetric algorithms, public-key systems can guarantee integrity and authentication, not only privacy" ("Public key cryptography," 2009). These are solid
systems. However, a primary disadvantage when using these types of systems is that they are not as quick as symmetric algorithms ("Public key cryptography," 2009). Another disadvantage is key size
...