Description
AIN3701 ACTRIVITY 8.2 SOLUTIONS SEMESTER 02 – 2023 (AIN3701 Step by Step Solutions and Guidelines for Activity8.2 2023)
This document contains all the answers and guidelines for the Activity questions provided. All answers are correctly written in accordance to the questions.
DOCUMENT PREVIEW
1
Subject: Illustrating Public Key Cryptography Using Ikhishi Likagogo Dear Mrs. Duma,
Public key cryptography is a crucial concept in cybersecurity, and I’d be happy to explain it using Ikhishi Likagogo as an example. This concept involves two keys: a public key and a private key, which work together to secure communication and data. Think of Ikhishi Likagogo as someone who wants to send secure messages to others.
Example 1: Ikhishi’s Secure Letter
Public Key: Ikhishi has a box with a slot (public key). Anyone can drop a letter into the box, but only Ikhishi can open the box and read the letters.
Private Key: Ikhishi also has a special key (private key) that unlocks the box. This key is kept secret and should never be shared.
Reviews
There are no reviews yet.