Wednesday, February 26, 2020

Information Technology Essay Example | Topics and Well Written Essays - 1000 words - 1

Information Technology - Essay Example 2007). Similarly, the RSA cryptography standard is associated with a Public Key Cryptography Standards (PKCS) that highlights data encryption by utilizing RSA algorithm. The primary objective or reason for this standard is the construction of digital envelops and digital signatures. Moreover, the standard also defines syntax for private and publics keys of RSA. The syntax is utilized for digital certificates and the syntax for private keys is utilized for private key encryption (RSA Cryptography Standard. 2007). Public key cryptography relies on algorithms associated with asymmetric cryptography along with two incorporated keys i.e. a public key and a private key. Likewise, these two keys are separate and are utilized for decrypting and encrypting data or messages. If any user composes an electronic mail, he or she possesses a private for the email themselves. However, if the sender tries to open the email, he or she must possess a public key for accessing it. RSA public key encrypti on algorithm converts the private key to public key. Moreover, a signature algorithm that ensures authenticity of the sender can be incorporated with the private key without the intervention of the private key, as fundamentally it will not be possible to search two messages possessing similar signatures. The PKCS incorporates different versions such as v 2.1 standards that are associated with deploying public key cryptographic encryption along with digital signatures with appendix. Moreover, it also reflects ANS.1 syntax that illustrates keys for identifying different schemes. RSA is basically a public key algorithm that is invented by Rivest, Shamir and Adleman (Biskup) and is focused on an exponentiation module that comprises of two great prime numbers. Likewise, the security incorporated in RSA algorithm is focused on the solidity of multiplying the procedure associated with great prime numbers. Moreover, in the next version i.e. version 2.1, RSA multiprime function was incorpora ted. The table 1.1 shows the encryption and decryption of messages by private and public keys. Activity Keys Sending an Encrypted Message or data Utilizing the receivers public key Sending an encrypted signature Utilizing the sender’s private key Decrypting an encrypted message Utilizing the receivers private key Decrypting an encrypted signature Utilizing the sender’s public key Figure 1.1 Comparison X.509 and PGP X.509 is considered to be an ITU-T standard that is known for Public Key Infrastructure (PKI). Likewise, it specifies standardized formats associated with public key certificates and a validation algorithm for certification path. Moreover, this standard was preliminary developed in 1988 and was integrated with X.500 standard (X.509. 2007). After the integration, it was considered to be a solid hierarchical mechanism of Certificate Authorities (CA) that is responsible for issuing certificates. It is a fact that X.500 system was not completely deployed, as the IETF working group associated with public key infrastructure has acquired the standard for Internet that is considered to be a flexible environment (X.509. 2007). Besides, in the year 1998, PGP was considered to be a relatively low cost solution possessing features such as robust file, disk and email encryption suite that is based on Network

Monday, February 10, 2020

Intercultural Conflict Analysis Essay Example | Topics and Well Written Essays - 1750 words

Intercultural Conflict Analysis - Essay Example Millions of immigrants go to foreign nations every year to find work and living. Labor immigration has become an important aspect to discuss in the world today because of the number of people, states and issues surrounding it. Million of foreign workers seek work in foreign countries such as oil-rich Saudi Arabia and Gulf States as well as the United States of America. According to the Bureau of Manpower, Employment and Training in Bangladesh, the number of immigrants migrating to Gulf Cooperation Council between 1976 and 2009 are over 5 million. Saudi Arabia and United States are the topmost destinations. International labor market migration has increased in the recent past with countries such as Japan, Lebanon, Malaysia, Singapore and Mauritius being the newest destination. The rise in international labor market has resulted in an increased complexity with respect to political and human right challenges. As governments struggle in the face of increased political pressure to exercise vigilance in exercising rights and wellbeing of its citizens, conflicts seem to be increasing also. Issues of migrant worker exploitation and increased prejudice against migrant workers, with the later exerting more pressure on the already unpredictable overseas human capital markets. According to International Labor Organization (ILO), the concept of labor exploitation can be understood as rejection of the specific rights pertaining to the immigrant labor in contrast to the guidelines set by National Labor Laws. Labor exploitation includes maltreatment of labor, physical torture & abuse, sexual abuse from employers along with mental and psychological torture among others .