Join the God Side, Jesus is Coming…….

Source: newHorizon-ITPro

Most of you have concerns about the security of the data they send and receive. Some Microsoft Windows operating systems include a native public-key infrastructure (PKI) that allows for both encryption and signing. Public-Key Cryptography guarantees that encrypted outgoing data can be understood only by the intended recipient, and ensures that signed incoming data actually came from the indicated source.

When Public-Key Cryptography is used, each person has two keys, a public key he/she shares with the world, and a private key that only he/she knows. Keys are mathematical values used to both encrypt and decrypt data. To send protected data to Jane, Joe must know Jane’s public key and use it to encrypt the data. Once encrypted, only Jane, using her private key, can decrypt the data. Jane can safely send her public key out to the world, but must protect the private key. Anyone can encode data using her public key, but only Jane can decrypt it accurately.

Suppose Joe needs data from Jane, and wants to make sure it is coming from only Jane. Jane can use her private key to encrypt the data. The data is not secure now because anyone with her public key can decrypt the data. However, only Jane’s public key can decrypt the data from her. If Joe uses Jane’s public key and decrypts the data successfully, he knows the data came from Jane. Jane’s use of her private key to encode the data is a way of signing her name to the data.

The public-key infrastuctrue of Windows permits high levels of security for email, internet exchanges, and local network traffic.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Tag Cloud

%d bloggers like this: