Public key infrastructure-asymmetric public


Question1. Describe the encryption or decryption process and state the two things on which the security of encrypted data is wholly dependent.

Question2. Illustrate briefly what SSL (Secure Socket Layer) is and how it can be applied to e-banking services to ensure security?

Question3. Mention the difference between private key cryptography and public key cryptography using suitable illustrations where essential.

Question4. Illustrate using suitable illustrations where necessary how asymmetric public key encryption ensures both confidentiality and authenticity.

Question5. Illustrate the role of the following players in Public Key Infrastructure (PKI)

(i) Certification authority

(ii) Certificate holder

(iii) Relying party

Request for Solution File

Ask an Expert for Answer!!
Finance Basics: Public key infrastructure-asymmetric public
Reference No:- TGS06716

Expected delivery within 24 Hours