Pgp encryption, Computer Network Security

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items:

  • A description of your experience in installing PGP on your machine. Include the date of installation, and any difficulties that you encountered.
  • The date on which you submitted your public key to your instructor, noting any difficulties encountered.
  • The date on which your public key, signed by your instructor, appeared on the PGP Key Server in the Conference area.
  • Exchange a PGP encrypted and signed message with your instructor. Document in your report the date(s) of the exchange, along with a brief description of how it went (difficulties experienced, etc.)
  • Exchange the following messages with at least three (3) different students:
    • An unencrypted, PGP signed message
    • A PGP encrypted, but unsigned message
    • A PGP encrypted and signed message

Show in your report the dates of each of these exchanges, along with a description of any difficulties encountered or other observations.

  • Try a PGP experiment of your own invention to test the capabilities of PGP. Write a paragraph or two describing your experiment, and what you learned from it.
  • Conclude with a brief summary of PGP, in particular, its strengths and weaknesses based on your experience with it.
Posted Date: 2/22/2013 8:02:30 AM | Location : United States







Related Discussions:- Pgp encryption, Assignment Help, Ask Question on Pgp encryption, Get Answer, Expert's Help, Pgp encryption Discussions

Write discussion on Pgp encryption
Your posts are moderated
Related Questions
Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

which is best algorithm

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more