Cryptography

Section 1 

Using the Internet and/or the Library, research and complete the following: 

In 1,000 words or more words, respond to the following: 

Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security. 

Section 2 

In 200 or more words for each answer, respond to the following: 

  • Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
  • How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process?