Encryption.edited (1)

docx

School

Moi University *

*We aren’t endorsed by this school

Course

110

Subject

Computer Science

Date

Nov 24, 2024

Type

docx

Pages

15

Uploaded by SargentRedPandaMaster260

Report
1 Lab 6: Advance Functions of the CrypTool Student’s Name Institutional Affiliation Course Instructor Date
2 Lab 6: Advance Functions of the CrypTool Comparison of ECB and CBC Crypt/Decrypt > Symmetric (modern) > DES (EBC)…
3 Crypt/Decrypt > Symmetric (modern) > DES (CBC)… When using the ECB mode of encryption, each plain text block is encrypted independently of the other. This means that if multiple blocks of plain text are the same, they will be encrypted to the same ciphertext ( Savka et al., 2021). If the ciphertext follows a pattern like the one given above, it may be possible to decipher the message. Each plaintext block is XOR with the preceding ciphertext block before being encrypted using the CBC form of encryption. To put it another way, even if you encrypt the exact plain text numerous times, you'll end up with different cipher text each time. This improves the encryption's safety by decreasing the prevalence of easily discernible patterns in the ciphertext. RSA demonstration RSA is an algorithm used for encryption and digital signatures. It is one of the most widely used cryptography algorithms in the world. RSA needs two huge prime integers to produce a public and private key pair. Anyone who wants to communicate securely or validate your digital signature may get your public key. To decode communications and create digital
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 signatures, a private key is used, and it is kept secret. RSA implementation Asymmetric cryptographic implementations, like RSA, need a pair of keys for encryption and decoding. Information may be encrypted with the help of the public key and decrypted with the private key (Savka et al., 2021). RSA is widely used in various applications such as digital
5 signatures, secure email, and secure data transmission. It is also used for authentication and key exchange. Hybrid encryption Hybrid encryption is an approach that uses many methods to provide a more secure encryption solution. Both symmetric and asymmetric encryption techniques are often used. In symmetric encryption, both the sender and the recipient use the same key in the encryption and
6 decryption processes. Question 1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Crypt/Decrypt > Symmetric (modern) > DES (ECB) Crypt/Decrypt > Symmetric (modern) > DES (ECB)
8 DES (ECB) and DES (CBC) are two different methods of encryption used to protect data. Both ways use the same underlying encryption algorithm, DES, but differ in how they encrypt data. DES (ECB) is the simplest form of DES encryption and works by encrypting each data block separately ( Bhanot et al., 2015). This implies that the ciphertext generated from the same plaintext will always be the same. Because an adversary might exploit this weakness by using patterns in the ciphertext, it is susceptible to targeted assaults. DES (CBC) employs an initialization vector (IV) to increase the unpredictability of the encryption process. The first data block is encrypted with the IV, and successive data blocks are encrypted using the ciphertext from the previous block. This makes the ciphertext more secure, as an attacker cannot identify patterns in the ciphertext because the same plaintext will produce different ciphertexts each time. CBC method is stronger than ECB
9 ECB CBC As seen from the screenshots above, the ciphertext produced with CBC does not have the same repeating pattern of the plaintext as the ciphertext created with ECB does. This is because CBC utilizes an Initialization Vector XOR'd with the plaintext before it is encrypted, thus making
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 it more secure. Therefore, it can be concluded that CBC is stronger than ECB when using the DES cipher. Question 2 First name ID Full name
11 Comparing the results, one can see that the encrypted message is different when we use different values for p, q, and e. This is because the public key is foreign in each case, so the encryption algorithm will use various mathematical operations to encrypt the message.
12 This demonstrates the importance of using different values for each encryption. If the same values are used for other messages, the same encrypted message will be produced, making it easier for someone to break the encryption. In conclusion, the RSA cryptosystem is a robust encryption method that generates a public and private key pair from two huge prime integers. Using unique values for p, q, and e is a must when encrypting a message using RSA. Question 3 In this example, a pair of asymmetric keys is created with a bit size of 512. A bit size of 512 means that the keys will be 512 bits in length. To generate the keys, we can use an RSA key generator. The screenshot below shows the generated public and private keys ( Bhanot et al., 2015). The public key consists of the modulus and the public exponent. A modulus is a large number, while the public exponent is usually a small number (often in the range of 3 to 17). Both of these components are required to encrypt data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13 To sum up, the RSA method is an asymmetric cryptographic technique for encryption and decryption. This method, which relies on the fact that huge numbers are hard to factor, is commonly used in business. A pair of keys, a public and a private one, is produced with a bit size of 512. The data is encrypted using the public key and decrypted with the private key. Our full name may be encrypted and decrypted using these keys.
14 Question 4 In the example, I used the hybrid encryption process to encrypt the name "Mazen Saleh Alghamdi." The first step was to generate a symmetric key using the AES algorithm ( Savka et al., 2021). The resulted ciphertext was then encrypted with the RSA algorithm using the
15 previously generated public and private keys. The encrypted data is now securely stored and can only be accessed by the private key owner. In conclusion Hybrid encryption is a powerful tool for protecting data from unauthorized access. Combining two different encryption algorithms provides an extra layer of security that would be difficult to achieve with either algorithm alone. This makes it an ideal choice for organizations that need to securely store sensitive data, such as financial and medical information. References Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications , 9 (4), 289-306. Savka, I., Yanovskyi, Y., Lazarovych, I., & Kozlenko, M. (2021). Visualization of advanced encryption standard cipher using CrypTool.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help