What happens to the plain text you get back

Assignment Help Computer Network Security
Reference no: EM131666189

Lab Assignment: Introduction to Computer and Network Security

Objective: Experiment with symmetric key encryption.

1. In this lab, we will use the openssl and GHex programs. Ensure that the programs are correctly installed on your virtual machine by running the following commands:

cct@cct-vm:$ dpkg -s openssl cct@cct-vm:$ dpkg -s ghex

If you wish to update the software installed on your VM to the latest version, you may do so with the following command (Note - you will be prompted for the cct user password to obtain elevated privileges for the software update):
cct@cct-vm:$ sudo apt-get update

If the programs are NOT installed on your VM, you may install them with the following commands:

cct@cct-vm:$ sudo apt-get install openssl cct@cct-vm:$ sudo apt-get install ghex

2. We will first experiment with openssl. All commands will be entered in the terminal. To get more information about openssl command, type "man openssl".

3. To encrypt or decrypt a file, refer the following sample commands where ciphertype, in- file, out-file, key and iv_used are replaced with the appropriate values. (">>" indicates a command to be executed; do not actually type ">>" into the terminal.) Note the differences between encrypting with the "-e" flag, and decrypting with the "-d" flag.

>> openssl enc ciphertype -e -in in-file -out out-file -K key -iv iv_used

>> openssl enc ciphertype -d -in in-file -out out-file -K key -iv iv_used

4. We first see the options when we are encrypting a file. Execute the example encryption command listed above, substituting in the following values for the respective parameters. Check with the TA if you are unsure if you are doing it correctly.

• ciphertype: -aes-128-cbc

• in-file: text.txt (create your own file with a few of lines of text)

• out-file: cipher.bin (no need to do anything; will be created automatically)

• key: 12345

• iv_used: 0123

Question 1. Copy the contents of the text.txt and cipher.bin into your report. Can you see any relationship between the two files?

Question 2. Now try creating different versions of text.txt, e.g. minor differences, very different, different characters, etc.. What can you see about the relationship between these different cipertext?

5. Now we will decrypt the file you encrypted earlier. We will use the following parameters. Make sure you can get back what you encrypted.

• ciphertext: -aes-128-cbc

• in-file: cipher.bin

• out-file: answer.txt (named something different from text.txt so as to compare)

• key: 12345

• iv_used: 0123

Question 3. Attempt to decrypt the cipher.bin using a different iv_used value. What happens to the plain text you get back? Try with different iv_used values and present the results in your report.

Question 4. What happens when you attempt to decrypt a file using the correct key and iv value, but using a different encryption mode, such as -aes-128-ecb, -aes-256-cbc, and/or -dec-cbc?

Reference no: EM131666189

Questions Cloud

Discuss reasons and the sentencing options : discuss your reasons and the sentencing options you might recommend to the judge in the case of a seriously mentally ill defendant
Saliency on one social identity : What are the effects of multiple group memberships and saliency on one's social identity?
Calculate tate and booth respective share of fees : Common costs. Tate Inc. and Booth Inc. are two small manufacturing companies that are considering leasing a cutting machine together.
Solving problem of the magic systems inc : Stand-alone revenue allocation. Magic Systems, Inc., sells computer hardware to end consumers. The CX30 is sold as a "bundle," which includes three hardware.
What happens to the plain text you get back : What happens to the plain text you get back? Try with different iv_used values and present the results in your report.
Knowledge of the world great classics : Discuss how knowledge of the world's great Classics (and classics) impacts higher level thinking in Management theory.
Describe data link layer of osi model : Describe layer 2 (data link layer) of OSI model, what is the function and what is layer 2 responsible for. Describe layer 3 (network layer) of OSI model.
Indian term meaning good camping : There is a town in Washington state that's meaning comes from an Indian term meaning good camping. What is the town called?
Discuss the marketing trends : Discuss the marketing trends and how they will drive specific markets, segments, and innovations. You must cite the articles.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the virus software running on your computer

Identify the Virus Software running on your computer

  Discussion of operating system patches

Prepare a well-written paper no more than 10 pages in length -  case studies related to cybersecurity and the use of social networking and home computer use.

  Characteristics of clausewitzs theory of warfare

Characteristics of Clausewitz's Theory of Warfare and compare and contrast the key characteristics of Clausewitz's theory of warfare.

  What is utc and why is it used

How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?

  What is a disaster recovery firm

What is a disaster recovery firm? When and why would you establish a contract with them?  -What is online backup?

  What exactly is cyberterrorism

What exactly is cyberterrorism and What is information warfare? How can information warfare be distinguished from cyberterrorism?

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  How do tables track the state and context of exchange packet

What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Describe worst practices that avoided when selecting an epp

Name and briefly describe three "best practices" that should be used when acquiring (purchasing) an EPP. Name and briefly describe three "worst practices" that should be avoided when selecting an EPP.

  Write =on various type of utility and its use to secure data

Write a paper about various types of Utility and its use to secure the data. 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

  Create alternative message which has hash value

Generates the alternative message which has a hash value which collides with Bob's original hash value. Illustrate a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Explain tools and techniques for removing malware

Discuss tools and techniques for removing Malware using the text Internet, and/or your job as reference for full credit. Discuss some steps required to harden a Microsoft Workstation using a product of your choice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd