Many network administratorsw know encryption software is the double-edged sword for network security.
Inspecting the content of the communication from the communication log becomes impossible if there is no key pair.
Please make the environment that can decode the content of the communication according to the following procedures when you use this application in-house.
- The manager makes the key pair for the employee.
- The manager uploads the public key for the employee to the Internet.
- The manager exports the key pair to the file.
- The manager passes the export key pair to a pertinent employee.
- The manager hands exported key file to a pertinent employee then an employee imports this exported key pair file.
- The manager makes the key pair for employee's destination party.
- The manager uploads the key for the destination to the Internet.
- The manager exports the key pair for the destination to the file.
- The manager encrypts the export key pair with a peculiar key to the destination.
- The manager sends the encrypted export key pair to the destination.
- The destination decrypts the encrypted export key pair.
- The destination is import as for the decrypted export key pair.
- The manager tells URL of the public key for the employee to the destination.
- The manager tells URL of the public key for the destination to a pertinent employee.
- Whenever the number of pertinent employee's destination increases, repeat from the chapter 6.
- Whenever the number of pertinent employees increases, repeat from the chapter 1.