Pgp encryption, Computer Network Security

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items:

  • A description of your experience in installing PGP on your machine. Include the date of installation, and any difficulties that you encountered.
  • The date on which you submitted your public key to your instructor, noting any difficulties encountered.
  • The date on which your public key, signed by your instructor, appeared on the PGP Key Server in the Conference area.
  • Exchange a PGP encrypted and signed message with your instructor. Document in your report the date(s) of the exchange, along with a brief description of how it went (difficulties experienced, etc.)
  • Exchange the following messages with at least three (3) different students:
    • An unencrypted, PGP signed message
    • A PGP encrypted, but unsigned message
    • A PGP encrypted and signed message

Show in your report the dates of each of these exchanges, along with a description of any difficulties encountered or other observations.

  • Try a PGP experiment of your own invention to test the capabilities of PGP. Write a paragraph or two describing your experiment, and what you learned from it.
  • Conclude with a brief summary of PGP, in particular, its strengths and weaknesses based on your experience with it.
Posted Date: 2/22/2013 8:02:30 AM | Location : United States







Related Discussions:- Pgp encryption, Assignment Help, Ask Question on Pgp encryption, Get Answer, Expert's Help, Pgp encryption Discussions

Write discussion on Pgp encryption
Your posts are moderated
Related Questions
project on ensuring data securities on cloud computing

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Ethernet is a commonly used LAN technology. It was discovered at EXROX PARC(Palo Alto Research Center) in 1970s.Xerox, Intel and Digital described it in a standard so it is also kn

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti