Pgp encryption, Computer Network Security

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items:

  • A description of your experience in installing PGP on your machine. Include the date of installation, and any difficulties that you encountered.
  • The date on which you submitted your public key to your instructor, noting any difficulties encountered.
  • The date on which your public key, signed by your instructor, appeared on the PGP Key Server in the Conference area.
  • Exchange a PGP encrypted and signed message with your instructor. Document in your report the date(s) of the exchange, along with a brief description of how it went (difficulties experienced, etc.)
  • Exchange the following messages with at least three (3) different students:
    • An unencrypted, PGP signed message
    • A PGP encrypted, but unsigned message
    • A PGP encrypted and signed message

Show in your report the dates of each of these exchanges, along with a description of any difficulties encountered or other observations.

  • Try a PGP experiment of your own invention to test the capabilities of PGP. Write a paragraph or two describing your experiment, and what you learned from it.
  • Conclude with a brief summary of PGP, in particular, its strengths and weaknesses based on your experience with it.
Posted Date: 2/22/2013 8:02:30 AM | Location : United States







Related Discussions:- Pgp encryption, Assignment Help, Ask Question on Pgp encryption, Get Answer, Expert's Help, Pgp encryption Discussions

Write discussion on Pgp encryption
Your posts are moderated
Related Questions

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

which is best algorithm

what are the participant of marketing channal?

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to