Public Key Infrastructure (PKI)-This assignment uses a GCU-provided virtual machine that will be specified by your instructor.
Sending email traffic across a public network is fraught with danger. Utilizing strong encryption technology is an important step in ensuring confidentiality, integrity, and availability (CIA).
Download and install the Thunderbird E-Mail Client on your GCU-provided virtual machine. Refer to the Thunderbird page of the Mozilla website, located in the topic Resources.
Configure the email client to use digital certificates to send encrypted emails.
Share your public key with another student in the class.
Exchange an encrypted email with the same student.
As you go, take instructional notes and screenshots that will help to reproduce your process using the “Report Template,” located in Class Resources.
Then, at the end of the report, write a 350- to 450-word essay describing which cryptographic protocols, tools, and techniques are appropriate for a given situation. Include:
The basic elements of a cryptographic system and the appropriate application(s) of different types of cryptography to internet security, computer security, and communications security, including privacy/confidentiality, authentication, integrity, nonrepudiation, and key exchange.
Two techniques used to preserve message confidentiality: symmetric and asymmetric encryption algorithms. Specifically, address the differences between the two and how to assign some measure of strength to cryptographic algorithms and the associated keys.
How cryptography can be used for data security or infiltration, focusing on strengths and weaknesses, modes, and common pitfalls, as well as issues that must be addressed in an implementation.
APA format is not required, but solid academic writing is expected.