APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique….
Write a 2 to 3 page paper (including screen captures) on Public Key Authentication. In what ways are public keys effective and in what ways can they be compromised?
Test how they are used by generating a public and private key on
1) a Windows system
2) a Linux system (you can use the virtual machine you created earlier)
A few resource links are listed in the Module