4/30/2009

Exercise 16-2

5. Get the latest PGP software from http://web.mit.edu/network/pgp.html; install it on two machines and encrypt a message on one machine and decrypt it on the other. Report your findings.

When i access to the MIT web site, it displays an error that is "The version of PGP available from MIT was significantly out of date and doesn't run on newer computers (at least not reliably)." So i download the PGP softwar from PGPI web site (
http://www.pgpi.org/products/pgp/versions/freeware/winxp/8.0/ )

Then, i apply 30 days trial license (DKLHX-P24TA-3JWW5-CAJ2W-6XGF9-DKC) in PGPI web site. When i have installed the pgp software and i find that the pgp software blocks my internet connection, so that, i can't do that test for you.

But I can try to explain my understand for you, the procedure as follows:
1. In your PC, use PGP software to generate a new PGP key (see figure 2 and 3).
2. In your PC, use PGP software to encrypt a file (see figure 4) with secure user key.
3. In your PC, use PGP software to export Key to File and transfer the Key to the recipient's computer.
4. In the recipient's PC, open PGP software and select "Import" button to import the received Key.
5. In the recipient's PC, use PGP software for signing the imported key and input the correct passphrase for KEY verification.
6. In the recipient's PC, open PSP software and select the encryted file, then click the "decrypt and verify" button for file decryption.
That'all!
Figure 2.
Figure 3.
Figure 4.
===============================================
6. The use of digital certificates and passports are just two examples of many tools for validating legitimate users and avoiding consequences such as identity theft. What others exist?
Besides use of digital certificates and passports for validating legitimate users and avoiding consequences such as identity theft, we can use (1) digital signature which is an electronic signature created using a private signing key, (2) biometrics which use physiological or behavioural characteristics to identify an individual and (3) soft token which is an e-authentication mechanism that is stored in a computer.

沒有留言:

發佈留言