Confidentiality and privacy - security, JAVA Programming

 

The confidentiality and privacy may be accomplished through encryption. Encryption may be:

Private-key or symmetric: This is based on a single key. This needs the sender and the receiver to share the same key. Both must have the key. The sender encrypts his code with a private key and the receiver decrypts the code with his own private key. This system is not suitable for large number of end users because it needs a key for every pair of individuals who require communicating privately.

Public-key infrastructure or asymmetric (PKI): This is relying on a pair of mathematically related keys. One is a public key, which is distributed to all the end users, and the other key is a private key, which is kept secretly hidden on the server. So this needs only two keys to talk to 1000 customers. This is also called Asymmetric encryption because the code encrypted by public key can only be decrypted by the private key and the code encrypted by the private key may only be decrypted by the public key.

 

Posted Date: 7/27/2012 6:05:18 AM | Location : United States







Related Discussions:- Confidentiality and privacy - security, Assignment Help, Ask Question on Confidentiality and privacy - security, Get Answer, Expert's Help, Confidentiality and privacy - security Discussions

Write discussion on Confidentiality and privacy - security
Your posts are moderated
Related Questions
What is an Exceptions ? • What is an exception? • try-catch • finally • The different kinds of exceptions • Multiple catch clauses • The throws clause • Throwing excepti


Instructions: Please make sure your solutions are original, in your own words, expressing your own ideas. Any copying from others' home-works, text books or online sources will

consider the file name cars.text each line in the file contains information about a car ( year,company,manufacture,model name,type) 1-read the file 2-add each car which is represen

Type casting defines treating a variable of one type as though it is another type. When up casting primitives as given below from left to right, automatic conversion happens. Bu

Question 1 What do you mean by Java Virtual Machine? Question 2 Write a simple Java program to display a string message and explain the steps of Compilation and execution in Jav

Write a program on Filling Rectangles ? The drawRect() method draws an open rectangle, a box if you prefer. If you need to draw a filled rectangle, use the fillRect() method. O

Consider the following C++ template class. #include using namespace std; template class SortedList { public: SortedList() {size = 0;} void insert(T item); friend ostrea

Create problem that solves cryptoarithmatic problem that uses from user using java

Explain the both HashSet and TreeSet? HashSet is an unordered, unsorted Set. It's a Collection set which restrict duplicate elements and also repositioning of elements. I