Digital signatures and public-key certificates

Assignment Help Computer Network Security
Reference no: EM133812873

You will concentrate on digital signatures and public-key certificates.

To prepare:

- Review the Assignment introduction and the Assignment tasks you will complete for Week 7. Note: You must provide screenshots for all major steps.

- Confirm the students you are collaborating with for this Assignment. Keep in mind that you are Student A for your Assignment and should have colleagues designated as Student B and Student C. You may also serve as Student B and/or Student C for other colleagues. Be prepared to fill these roles and complete the Assignment by Day 7 this week.

Introduction:

When you import a user's public key, it is not trusted. For example, [email protected]'s public key in Figure 1's GPG keychain (shown below) is not trusted.

There are two ways to make a key trusted. One way is to sign it directly using your private key. But in this case, you need to know that the key is indeed from Alice. In Figure 1, the user (Yongge Wang) has signed Bill Wang's public key. Thus, the GPG keychain in Figure 1 shows that Bill Wang's public key is trusted. Hire Writers Now!

There is another way to use a certificate chain to make a key trusted. That is, the user (Yongge Wang) trusted Bill Wang's key. Bill Wang trusted George Wang's key by signing it. Then if the user (Yongge Wang) imports George Wang's key (signed by Bill Wang), the user's (Yongge Wang's) GPG keychain will trust George Wang's key.

Assignment Tasks:

Question 1. Digital message signature: Send an email to your Instructor containing at least one message signed with your private key and ask your Instructor to verify whether your signature on the message is valid. The message should not be encrypted, i.e., the format is a clear message with a signature on the message.

Question 2. Certificate chain: To complete this part, each student (Student A) needs to sign another student's (Student B) public key. Student B then needs to sign another student's (Student C) public key. Student A needs to import Student C's key (that is signed by Student B). Then Student A's screen should show that Student C's key is trusted. (Student A must not sign Student C's key; you will not get a grade if all keys are signed by you.) Then Student C should send a signed email to Student A, and Student A's email client should automatically verify it.

Submit a 3- to 5-page report in Microsoft Word and APA format that includes the following:
- Describe in detail the steps you have taken as Student A, with screenshots of all major steps. Ensure your report contains:

1. The messages that you signed and sent to others.

2. The signed messages that you have received from others and for which you have verified the signatures.

3. Student B's public key that you have signed.

4. Student C's public key that you have not signed, but which is signed by Student B.

5. GPG keychain screenshot that shows that Student C's key is trusted by you (validity part is green).

6. Expanded key property for Student C's public key that shows you have not signed C's key.

7. A signed message from Student C that your email client shows the signature is valid.

Your document should be 3-5 pages long (not including the title page or reference list) but the quality of the work is most important, not the number of pages. Cite and reference all sources using APA format and style guidelines. Submit in a single document.

Reference no: EM133812873

Questions Cloud

Civil legal tradition begins to do something very specific : The civil legal tradition begins to do something very specific that the chthonic legal tradition didn't, protect identities.
Probable cause to search vehicle for controlled substances : Did Officer Machens have probable cause to search the vehicle for controlled substances? Discuss
What is the necessary service or program : What is the necessary service or program? How will it address the needs you have examined? How is the lack of available resources exacerbating the issue?
What are the most relevant provisions of the code : What are the ethical issues here? What are the most relevant provisions of the Code?
Digital signatures and public-key certificates : Applied Cryptography Concentrate on digital signatures and public-key certificates - Send an email to your Instructor containing at least one message signed
How psychological and socio-cultural factors influence : Explain how biological, psychological and socio-cultural factors influence development through the lifespan.
Verbal communication-termination : The residency appeal hearing for Pedro Rosario is coming up at the IAD in four days
Identify the problem in the joint venture that triggered : Identify the problem in the joint venture that triggered the conflict between the two companies and discuss the differences of each company's understanding.
Employee recover damages for breach of trust : Can an employee recover damages for breach of the trust and confidence term when he first learns of the breach after he has left the employment?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd