Reference no: EM132373388
Network and Information Security
Scenario:
Alice and Bob are two data scientists based in two countries. They are working on sensitive government data sets to track terrorist activities. They do not want to use existing chat applications or email services to share their data sets and analysis reports. Instead of the existing solutions, they want to implement a secure communication tool to share their contents.
Task 1: Using your expert knowledge in encryption\decryption algorithms, suggest a framework for them to achieve their goal.
i. Using a diagram Illustrate how they could implement the secure communication tool. You should consider the prevailing secure key exchange and symmetric encryption methods when designing this tool.
(3 Marks)
ii. Discuss the challenges that would be encountered in key exchange process. Suggest methods to overcome challenges in such environments by employing a Certificate Authority (CA)
Task 2: To demonstrate the practical implementation of the public\private encryption, you have been asked to compete the following task.
i. Type the following message in a .txt file:
"My student ID is : <<Your Student ID>>"
ii. Download the public key given in this assignment folder and encrypt your message with the same key using openssl.
iii. Using openssl, generate RSA key pair (2048bits) in your computer.
Attachment:- Network and Information Security.rar