Question: Computer Security Project 6: RSA Exercise Establish and document the process of building and using an RSA encryption key. The key length you use must
Computer Security
Project 6: RSA Exercise
Establish and document the process of building and using an RSA encryption key. The key length you use must meet current industry standards. Encrypt the class syllabus using your public key and decrypt it using your private key. Submit your report, the encrypted file, and your keys in the appropriate dropbox. Include appropriate screen captures and references.
***Important: You will also need to provide an opening paragraph or set of paragraphs (1/3rd to 1/2 of a page) with citations showing two or more current real-world situations where that particular crypto service is appropriately implemented.***
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
