What key type was use to create the certificate on kleopatra

Assignment Help Computer Engineering
Reference no: EM131152997

Lab - Using Encryption to Enhance Confidentiality and Integrity

Overview

In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and a private key as both a sender and a receiver. You used the sender's keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver's copy of the keys.

Lab Assessment Questions & Answers

1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both?

2. What does Kleopatra allow you to do once it is installed?

3. What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

4. What was the fingerprint generated with your Kleopatra certificate?

5. If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?

Reference no: EM131152997

Create a database to keep track of all the students

explain how you would design a database to keep track of all the students at a university. describe tables, relationships, attributes, Primary Keys, Foreign Keys, Candidate

Explain what psychological factor can often motivate hackers

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cy

The pros and cons of using sessions

What are the advantages and disadvantages of using cookies? What are the advantages and disadvantages of using sessions? Is one more secure than the other and why?

Create application to manipulate array of student record

Create an application to manipulate an array of student record objects. A student record will consist of a name (first, middle, and last), an ID number (9 numeric digits, ca

Type of structure-frame structure system

There are different types of frame system which are having combination beams(which is called horizontal element) , column (which is called vertical element)  and slab to hol

Define the defuzzification method for your system

Implement the fuzzy sets as membership functions in your program. You may use any of the membership functions we discussed in class - Define the defuzzification method for yo

Identify any one provision of the patriot act

Identify any one provision of the PATRIOT Act that is considered potentially unconstitutional. Explain the objection. Do you agree that the provision is unconstitutional Why

Compare power loss if 500 kw of power is transmitted

A program to analyze the power loss in a transmission line with a resistance of 0.05 ohms/mile. Compare the power loss if 500 kw of power is transmitted from a power generat

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd