Can you enter plain key or do you have to use the encrypted

Assignment Help Computer Network Security
Reference no: EM131144258

Lab Assignment: Advanced Encryption Standard (AES)

This exercise uses theAdvanced Encryption Standard (AES). The United States National Institute of Standards and Technology (NIST) adopted AES as Federal Information Processing Standards Publications 197(FIPS PUB 197) in 2001. AES supports key lengths of 128, 192, and 256 bits; JavaScrypt uses 256 bit keys exclusively.

For this exercise, you will need to use two different e-mail accounts (i.e., your Strayer email account and your personal email account). You will be creating an encrypted message and sending it from your first e-mail account to your second e-mail account.

Instructions

• Capture a screenshot as you complete each one of the lab steps and paste it in the designated spot below each step.

If there is a question in a step, your response should be included directly under the screenshot of that step.

Lab Steps:

1. Go to the JavaScrypt Encryption and Decryption page, located at https://www.fourmilab.ch/javascrypt/javascrypt.html

<paste screenshot here>

2. Create a key and enter it into the text box under the "Key" section. (The text option button under the textbox should be selected.) Next, click the "Generate" command button. Copy the contents of the "Key" text box to a notepad file because you will need it later.

<paste screenshot here>

3. Then, go to the "Plain Text"" box immediately underneath the "Key" text box and enter text that you want to encrypt. (The "Codegroup" option button under the textbox should be selected.) Click the "Encrypt" command button.

<paste screenshot here>

4. Look at the "Cipher Text" text box located below the "Encrypt" command button. Explain what is there.

<paste screenshot here>

5. Login to your second e-mail account and open a new email.

<paste screenshot here>

6. Copy the contents of the "Cipher Text" text box into the body of the email that you will be sending to your second email account.

<paste screenshot here>

7. Clear the contents of each of the "Key," "Plain Text," and "Cipher Text" text boxes.

<paste screenshot here>

8. Send the email from your first email account to your second email account.

<paste screenshot here>

9. Go to your second email account and open the email that you sent to yourself. Copy the encrypted message and paste it into the "Cipher Text" text box at https://www.fourmilab.ch/javascrypt/javascrypt.html. Click the "Decrypt" command button.

<paste screenshot here>

10. Look back in the "Plain Text" text box. What do you see? Discuss what happened.

<paste screenshot here>

11. Now, enter the key (plain or encrypted) into the "Key" text box. Which key did you enter? Can you enter the plain (unencrypted) key or do you have to use the encrypted one in order for the contents of the encrypted "Cipher Text" text box to be unencrypted and displayed in the "Plain Text" text box? Provide a rationale for your response.

<paste screenshot here>

12. If a person does not have the original encrypted key, can he or she encrypt the original key that he or she entered in the "Key" text box? Provide a rationale for your response.Note: No screenshot is needed for this step.

13. Explain the differences, if any, between using AES encryption versus a DES one. Note: No screenshot is needed for this step.

14. Why do many consider AES encryption more secure than DES? Provide a rationale for your response. Note: No screenshot is needed for this step.

Reference no: EM131144258

Questions Cloud

Calculate both cp and cpk : Using an USL of 40 and an LSL of 20, calculate both Cp and Cpk where Cp = (USL-LSL)/6*σ and Cpk = Minimum of (USL-μ)/3σ and (μ-LSL)/3σ.
How byod either positively affect an organizations security : Provide a real-world example of how BYOD either positively or negatively affected an organization's productivity and / or security.
What is meant by pareto efficiency : What is meant by Pareto efficiency? What is required for the economy to be Pareto efficient? If the conditions of the basic competitive model are satisfied, is the economy Pareto efficient?
Develop a materials requirement plan : Develop a materials requirement plan (MRP) for component parts K and W over the next eight weeks. - calculate the labor-hours needed in each of the two work centers in each week.
Can you enter plain key or do you have to use the encrypted : Can you enter the plain (unencrypted) key or do you have to use the encrypted one in order for the contents of the encrypted "Cipher Text" text box to be unencrypted and displayed in the "Plain Text" text box?
Do highways provide an example of a public good : Can you describe a situation in which the marginal 258∂ CHAPTER 11 INTRODUCTION TO IMPERFECT MARKETS costs of an additional driver on the highway might be high? How might society deal with this problem?
Presented below are data on three promissory notes : Presented below are data on three promissory notes. Determine the missing amounts.
Compute interest and find the maturity : Compute interest and find the maturity date for the following notes.
Jamar company sold its accounts receivable : Jamar Company sold its accounts receivable of $60,000.What entry should Jamar make, given a service charge of 3% on the amount of receivables sold?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe your thesis regarding the future of cybersecurity

Describe your thesis regarding the future of cybersecurity. Analyze the future of cybersecurity, including any opportunities for cooperation between the government and the private sector in creating or building a national cybersecurity infrastruct..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  Concentrate on the digital signatures and certificate chain

You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Web-based interface running on another server

Car Rental USA hired you as a consultant. They are building an in-house application system that will pull data from a database located on one server, and display it via a Web-based interface running on another server. What are security issues t..

  Single selector signal

The 2 to 1 multiplexer has two inputs (X1 and X2), and a single selector signal (S). All three switches (S1, S2, and S3) are set as toggle switches.

  Using the prime p 2621and encryption key e 7 encrypt the

1 using the prime p 2621and encryption key e 7 encrypt the message sweet dreams using modular exponentiation.2 what

  Evaluate the physical security infrastructure

Evaluate the physical security infrastructure at your school or place of business - We can't forget about physical security! After reading through the SANS Physical Security checklist attached here, evaluate the physical security infrastructure at ..

  Unique characteristics of the russian culture

What are some unique characteristics of the Russian culture that make cyberspace issues more challenging - do Russia and China do enough in the cyberspace area?

  Overview on computer forensic

Computer Forensic Overview.Suppose you were recently hired for a new position as the computer forensics specialist at a medium- sized communications company.

  Discuss the role of the federal government

CSEC 670 Assignment - How do the emerging cyber security technologies that you identified coupled with prioritized research and development improve cyber security?

  What type of security policy should be used and why

What technologies should be used to secure those areas?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd