Cryptography

Write a 2 to 3 page paper (including screen captures) on Public Key Authentication. In what ways are public keys effective and in what ways can they be

compromised?

Test how they are used by generating a public and private key on

1) a Windows system

2) a Linux system (you can use the virtual machine you created earlier)

A few resource links are listed in the Module

https://phoenixnap.com/kb/generate-setup-ssh-key-ubuntu

https://www.linode.com/docs/security/authentication/use-public-key-authentication-with-ssh/

https://serverpilot.io/docs/how-to-use-ssh-public-key-authentication/

Sample Solution