Question

In: Computer Science

The confidentiality of the exchanged messages between users is not protected in most messaging systems. In...

The confidentiality of the exchanged messages between users is not protected in most messaging systems. In most other words, they can read the messages you send to your friend through your service provider. In principle, before transmitting your message to the recipient the service provider can also change the content of your message.

Can you explain the public key encryption and private key encryption?

Using the Public key and private key, How does the sender, receiver and service provider communicate to send and receive messages?

The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?

Solutions

Expert Solution

Encrypting the message will help in maintaining the confidentiality of the exchanged messages between users. It is the process of encoding information to prevent anyone other than its intented receipt from viewing it. The encrypted information is unreadable to anyone who does not have access to a special key used to decrypt the information so that it’s readable.
Two modern methods of encryption are the Public Key (Asymmetric) and the Private Key (Symmetric) methods.
While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.
1) Public Key Encryption
Public Key (Asymmetric) Encryption makes use of a recipient’s public key, along with a private key that mathematically matches the public key. A user can then send a message encrypted with the public key, which is then decrypted by the recipient, using their matching private key.

When using this encryption method, a sender can “unlock” a mailbox to place a message into it, but they would not be able to look at any of the other messages that may be in the mailbox, since the message can only be decrypted by using the recipient’s private key.
2) Private Key Encryption
The Private Key (Symmetric) Encryption method is similar to the Public Key method, as two keys are still required to encode and decode the information.
However, when using the Private Key Encryption method, both keys are basically the same. This means that both parties are allowed to encrypt and/or decrypt the information.

​​​​​​

Both methods make for efficient ways to protect messages and other information from viewing by those that have no business viewing your sensitive personal and business information.
The above two methods will help in encrypting the message that would prevent the utility company from knowing the content of the communications being exchanged.The service provider will not be able to read the encrypted message without the encryption key. If the receiver is online or available the sender can see their status in profile ensuring that they are available. After receiving the message by the receiver, the sender will be notified that message is received and seen by the user, thus ensuring that there is no manipulation between the sender and receiver maintaining the confidentiality of the exchanged messages.


Related Solutions

1) What is the importance of positive messaging? How can you convey positive messages about yourself...
1) What is the importance of positive messaging? How can you convey positive messages about yourself in your professional communications? In your Final Portfolio? Share a tactic you can use to improve your positive messaging or tone?
3) Suppose the number of users (i.e. total quantity demanded) for a new online messaging service...
3) Suppose the number of users (i.e. total quantity demanded) for a new online messaging service (NOMS) is: ?=?−?+??? ?h????∈(0,1),?? ???h????????????????????,????h??????. a) Interpret the parameter ?. What strategies can NOMS use to affect ?? 1 b)Suppose?=100, ?=2, ????h??????????????????????????? ???h???=? ,andthe marginal cost per user is 0. What is the profit maximising price? (1 mark)
what is the difference between a protected and unprotected strike.
what is the difference between a protected and unprotected strike.
1. "The process provides interaction between users and designers, between users and evolving tools and between...
1. "The process provides interaction between users and designers, between users and evolving tools and between designers and evolving tools (technology)". List three questions that: a. Designers should ask users b. Users should ask designers c. Designers should ask themselves 2. Provide FIVE examples of software projects that would be amenable to the incremental model. Be specific. 3. Are the unified process and UML the same thing? Explain
the difference between confidentiality and privacy is that privacy is the right of an individual to...
the difference between confidentiality and privacy is that privacy is the right of an individual to keep his or her information private while confidentiality is a client's right to a privacy that clients must give consent to disclose any informations about them with other professionals or anyone entrusted. give your opinion
List the most common and globally used medical coding and classification systems AND differentiates between those systems.
List the most common and globally used medical coding and classification systems AND differentiates between those systems.  
What is the most favorable corporate strategy option to enter an industry that is protected by...
What is the most favorable corporate strategy option to enter an industry that is protected by high barriers to entry? Why?
Question 1 ​1. Text messages were first made available to cell phone users with the advent...
Question 1 ​1. Text messages were first made available to cell phone users with the advent of ____ technology. a. ​3G b. ​1G c. ​2.5G d. ​2G 1 points Question 2 ​A Bluetooth-enabled smartphone will also be compatible with a Bluetooth-enabled ____. a. ​notebook computer b. ​printer c. ​car d. ​all of the above 1 points Question 3 ​A MAC address contains ____. a. ​only symbols b. ​digits and letters c. ​only digits d. ​only letters 1 points Question 4...
whats most important about ommunicating routine messages and building goodwill; communicating persuasive messages; communicating bad news;...
whats most important about ommunicating routine messages and building goodwill; communicating persuasive messages; communicating bad news; and using social media in business.
What are the primary differences between industrial users and home users of electricity that allow the...
What are the primary differences between industrial users and home users of electricity that allow the utilities to discriminate between the two markets in terms of price? How do we compensate for these differences in order to impove the "common good" and what effects may this have on relative prices?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT