Why Email Encryption Is Difficult :
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
This is purely a Cryptography subject(Course).
Encrypted email services almost always require some kind of software (like an email client) installed on both the sender’s and the recipient’s devices in order to manage the exchange of public and private keys. If the recipient doesn’t have nodes that can find the keys, you can’t decrypt the message and the encryption becomes worthless.This installation can be mitigated by using a browser app (where the browser hosts the installed software). In this case, users can encrypt messages on the client side and in transit as long as the sender and recipient are using the same service. In other words, if both people are using Gmail, the messages can be encrypted without much extra effort on the user’s part.
*****However, if someone using Gmail wants to send to someone using Hotmail, encryption becomes extremely difficult for the average user to manage.*** A separate problem is how the keys are created, stored and managed. If many services in an enterprise choose to use master keys for encrypting information in bulk this can improve performance, but can also lead to massive breaches where one hacked key gives a hacker access to many user accounts. Separately, the provider in almost every case keeps a backup of all user keys (in case, for example, they forget their password). In order to be truly secure, a user needs to have the option to forbid the service from keeping a backup key.
–>Make sure to follow APA style. Please make sure your submission is 8-9 pages in length and meet the minimum APA formatting guidelines.1” margins on all sides, Please cite the source using APA formatting guidelines.Be sure to include reference sources.
We want something in this Format:
TABLE OF CONTENTS
LIST OF TABLES
LIST OF FIGURES(If any )
CHAPTER I: Introduction
CHAPTER II: Literature Review ((Minimum 5 good academic articles))
CHAPTER III: METHODOLOGY
CHAPTER IV: RESULTS
CHAPTER V: CONCLUSION