Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

you are required to learn the gpg pgp package learning about the applications of private and public key cryptography to secure email messages and documents to be able to at least answer the following questions use kelopatra software or any others pg

You are required to learn the GPG/PGP package (learning about the applications of

private and public key cryptography to secure email messages and documents) to be

able to at least answer the following questions. Use Kelopatra software or any others

PGP based software.

1. How to generate private and public keys utilizing the keyring of PGP ?

a. Details steps on how to generate the keys?

b. The recommended key length

2. Build a certificate for your email using PGP

3. How to validate your public key and others public keys (Practical)?

4. Show a practical scenario using PGP on How to protect your private key

in case it falls into the wrong hands?

5. How to protect public keys from tampering

a. How to validate your public key and others public keys.

6. How to secure messages for exchange between you and your friends

(encrypt messages to send to one or more people) using a secrete key?

7. How to create a ciphertext message using PGP and include it in your

email for transmission as normal email on the Internet?

8. Using online certificates checker: https://www.digicert.com/help/ to check

the validity of iau.edu.sa certificate? Provide the details of the certificate?

Test also the uod.edu.sa domain? [this question is not related to PGP]

Refer to

(1) http://www.pa.msu.edu/reference/pgpdoc1.html

(2) http://www.pa.msu.edu/reference/pgpdoc2.html

(3) G. Pgp, “Pretty Good Privacy TM PGP for Personal Privacy , Version 5 . 0 User ’ s

Guide.”

(4) “How To Use GPG to Encrypt and Sign Messages | DigitalOcean.” [Online].

Available: https://www.digitalocean.com/community/tutorials/how-to-use-gpgto-encrypt-and-sign-messages. [Accessed: 29-Nov-2018].

(5) E. L. Howes, “PGP: Key Revocation Certificates.” [Online]. Available:

http://www.spywarewarrior.com/uiuc/ss/revoke/pgp-revoke.htm#Why.

(6) “Protecting Public Keys | HFC Portal.” [Online]. Available:

https://my.hfcc.edu/its-help-desk/rootcert/protecting-public-keys. [Accessed:

29-Nov-2018].

(7) “Validating other keys on your public keyring.” [Online]. Available:

https://www.gnupg.org/gph/en/manual/x334.html.

any document about PGP/GPG)

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"