Pgp encryption, Computer Network Security

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items:

  • A description of your experience in installing PGP on your machine. Include the date of installation, and any difficulties that you encountered.
  • The date on which you submitted your public key to your instructor, noting any difficulties encountered.
  • The date on which your public key, signed by your instructor, appeared on the PGP Key Server in the Conference area.
  • Exchange a PGP encrypted and signed message with your instructor. Document in your report the date(s) of the exchange, along with a brief description of how it went (difficulties experienced, etc.)
  • Exchange the following messages with at least three (3) different students:
    • An unencrypted, PGP signed message
    • A PGP encrypted, but unsigned message
    • A PGP encrypted and signed message

Show in your report the dates of each of these exchanges, along with a description of any difficulties encountered or other observations.

  • Try a PGP experiment of your own invention to test the capabilities of PGP. Write a paragraph or two describing your experiment, and what you learned from it.
  • Conclude with a brief summary of PGP, in particular, its strengths and weaknesses based on your experience with it.
Posted Date: 2/22/2013 8:02:30 AM | Location : United States







Related Discussions:- Pgp encryption, Assignment Help, Ask Question on Pgp encryption, Get Answer, Expert's Help, Pgp encryption Discussions

Write discussion on Pgp encryption
Your posts are moderated
Related Questions
Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.