The document provides instructions for a lab assignment on encryption techniques. It includes 8 questions covering Caesar and Vigenere ciphers, XOR encryption, FreeCrypt, cryptanalysis by letter shifting, Pretty Good Privacy (PGP) encryption, definitions of symmetric and asymmetric encryption, and hash functions. Students are asked to decrypt ciphertext using online tools, analyze encryption methods, experiment with the PGP desktop trial, and define key concepts.
The document provides instructions for a lab assignment on encryption techniques. It includes 8 questions covering Caesar and Vigenere ciphers, XOR encryption, FreeCrypt, cryptanalysis by letter shifting, Pretty Good Privacy (PGP) encryption, definitions of symmetric and asymmetric encryption, and hash functions. Students are asked to decrypt ciphertext using online tools, analyze encryption methods, experiment with the PGP desktop trial, and define key concepts.
The document provides instructions for a lab assignment on encryption techniques. It includes 8 questions covering Caesar and Vigenere ciphers, XOR encryption, FreeCrypt, cryptanalysis by letter shifting, Pretty Good Privacy (PGP) encryption, definitions of symmetric and asymmetric encryption, and hash functions. Students are asked to decrypt ciphertext using online tools, analyze encryption methods, experiment with the PGP desktop trial, and define key concepts.
Please answer the following questions in your lab report.
1) Caesar Cipher: What does the cipher text below say? You can try to analyze by hand or use the tool at the following link: http://www.simonsingh.net/The_Black_Chamber/caesar.html LZAK AK S LWKL GX LZW USWKSJ KZAXL UAHZWJ HDWSKW LWDD EW OZSL LZAK EWKKSYW KSQK 2) Vignere Square Tool Cipher: Same as above. Tell me what the message below says. Link: http://www.simonsingh.net/The_Black_Chamber/vigenere_tool.html . In the Insert Keyword Here box type in UTICACOLLEGEPIONEERS; thats the way the cipher alphabet is created. Make sure you analyze how the cipher text was created and likewise how the cipher text was changed back into plain text. OMQEAECWWIMIWWQXICGDURAKNVVPPGGGLMGGGSEXYKMPCG 3) XOR Encryption: I have used XOR encryption to encrypt a word made up of seven characters. The characters of this word have each been encrypted used using XOR encryption. The cipher text of the word is as follows: 00010000 00011011 00010110 00000111 00001100 00000101 00000001 The key is: 01010101 Use http://www.tech-faq.com/xor-encryption.shtml to guide you through the decryption phase. After you have applied the key to the binary strings above you can use the ASCII to binary conversion chart at http://www.pcguide.com/res/tablesASCII-c.html to determine what letter each eight bit string stands for and thus what the word is. 4) FreeCrypt: This lab will consist of a short hands-on exercise to use the FreeCrypt program as a tool to illustrate encryption concepts. You will need to register at the
following link: http://www.steganos.com/en/products/for-free/freecrypt/overview/
Once you have registered please decrypt the following message; Ev1WbmNnKvP98RMWHaPUNR+c8wQHfIlCH8E54wGU1Z5S9eoLeJhwz87BHCbXe wTC3dRn7hBWaimCn6hoTYmDdkYpOGGXrYCE3DlplvU5RQOVHMiCyE5U6qaQ53 cgJde5ebeS9/eFBCXpjrEwY8B3hhJyBE0FqagoljGa7EUiZ0I= The password for this exercise is abc123. In addition to answering the questions posed in the encrypted question, what in your opinion is the weak point of this system? NOTE: At the Steganos web site, there are two other free tools: Safe One and LockNote. Take a look at them. What do they do? 5) Cryptanalysis: Decrypt the following message. I am not giving you the key, but I will give you a clue, the letters are shifted. Describe how you approach solving this type of problem. UIJT JT B TFDSFU NFTTBHF 6) PGP: The tools that you have used above are what are known as secret key or symmetric encryption systems where a secret key must be shared. In PGP things are little different. PGP uses aspects of symmetric encryption but uses the concept of asymmetric encryption to exchange secret session keys. PGP is actually a hybrid cryptography system. In this type of system, a user encrypts a message with a secret session key and then locates in a directory the user that they wish to send the message to. When they locate that user they encrypt the secret session key with the recipients public key. Upon receipt of the message the user can decrypt the secret session key with their private key and then use the secret session key to decrypt the message. Experiment with the PGP system by downloading the trial version from the following link: http://www.pgp.com/downloads/desktoptrial/desktoptrial2.html. Conduct the experiment by sending an encrypted message to and receiving an encrypted message from your lab partner. Document all the steps you took in order to earn credit for part 6. 7) Symmetric and Asymmetric Encryption: Define and describe symmetric and asymmetric encryption. Discuss advantages and disadvantages of each. Why is it important to exchange keys out of band in symmetric encryption? 8) Hash Functions: What is a hash function? What are some hash algorithms? What can a hash be used for?
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
The Star Interview: The Ultimate Guide to a Successful Interview, Learn The Best Practices On How to Ace An Interview As Well As Crucial Mistakes You Need to Avoid In Order To Land the Job
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications