Encryption.edited

docx

School

Moi University *

*We aren’t endorsed by this school

Course

110

Subject

Computer Science

Date

Nov 24, 2024

Type

docx

Pages

15

Uploaded by SargentRedPandaMaster260

Report
1 Lab 6: Advance Functions of the CrypTool Student’s Name Institutional Affiliation Course Instructor Date
2 Lab 6: Advance Functions of the CrypTool Comparison of ECB and CBC Crypt/Decrypt > Symmetric (modern) > DES (EBC)…
3 Crypt/Decrypt > Symmetric (modern) > DES (CBC)… When using the ECB mode of encryption, each plain text block is encrypted independently of the other. This means that if multiple blocks of plain text are the same, they will be encrypted to the same ciphertext ( Savka et al., 2021). This can lead to observable patterns in the ciphertext, as in the example above. Using the CBC mode of encryption, each block of plain text is first XORed with the previous ciphertext block before being encrypted. This means that even if multiple blocks of plain text are identical, they will be encrypted to different cipher text. This helps to reduce the number of visible patterns in the ciphertext, thus increasing the security of the encryption. RSA demonstration RSA is an algorithm used for encryption and digital signatures. It is one of the most widely used cryptography algorithms in the world. RSA uses two large prime numbers to generate a public and private key pair. The public key is available to anyone who needs to send
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 encrypted messages or verify your digital signature. The private key is kept secret and is used to decrypt messages and generate digital signatures. RSA implementation RSA implementation is an asymmetric cryptographic algorithm which uses two different keys for encryption and decryption. The public key is used to encrypt the data, while the private key is used to decrypt the encrypted data ( Savka et al., 2021). RSA is widely used in various applications such as digital signatures, secure email, and secure data transmission. It is also used for authentication and key exchange.
5 Hybrid encryption Hybrid encryption is a method of encryption that combines two or more encryption techniques to provide more security than any single method can provide. It generally involves using both symmetric and asymmetric encryption methods. Symmetric encryption is a method where the sender and receiver use the same key to encrypt and decrypt the data.
6 Question 1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Crypt/Decrypt > Symmetric (modern) > DES (ECB) Crypt/Decrypt > Symmetric (modern) > DES (ECB)
8 DES (ECB) and DES (CBC) are two different methods of encryption used to protect data. Both ways use the same underlying encryption algorithm, DES, but differ in how they encrypt data. DES (ECB) is the simplest form of DES encryption and works by encrypting each data block separately ( Bhanot et al., 2015). This means that the same plaintext will always produce the same ciphertext, regardless of the order of the data blocks. This makes it vulnerable to specific attacks, as an attacker could identify patterns in the ciphertext. DES (CBC) works by using an initialization vector (IV) to add randomness to the encryption process. The IV encrypts the first block of data, and then each subsequent block is encrypted using the ciphertext from the previous block. This makes the ciphertext more secure, as an attacker cannot identify patterns in the ciphertext because the same plaintext will produce different ciphertexts each time. CBC method is stronger than ECB
9 ECB CBC As seen from the screenshots above, the ciphertext produced with CBC does not have the same repeating pattern of the plaintext as the ciphertext created with ECB does. This is because CBC utilizes an Initialization Vector XOR'd with the plaintext before it is encrypted, thus making
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 it more secure. Therefore, it can be concluded that CBC is stronger than ECB when using the DES cipher. Question 2 First name ID Full name
11 Comparing the results, one can see that the encrypted message is different when we use different values for p, q, and e. This is because the public key is foreign in each case, so the encryption algorithm will use various mathematical operations to encrypt the message.
12 This demonstrates the importance of using different values for each encryption. If the same values are used for other messages, the same encrypted message will be produced, making it easier for someone to break the encryption. In summary, the RSA cryptosystem is a powerful encryption technique that uses two large prime numbers to generate a public and private key. When using RSA to encrypt a message, it is essential to use different values for p, q, and e to ensure the security of the news. Question 3 In this example, a pair of asymmetric keys is created with a bit size of 512. A bit size of 512 means that the keys will be 512 bits in length. To generate the keys, we can use an RSA key generator. The screenshot below shows the generated public and private keys ( Bhanot et al., 2015). The public key consists of the modulus and the public exponent. A modulus is a large number, while the public exponent is usually a small number (often in the range of 3 to 17). Both of these components are required to encrypt data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13 In conclusion, the RSA algorithm is an asymmetric cryptographic algorithm used to encrypt and decrypt data. It is widely used in the industry and is based on the fact that it is difficult to factor in large numbers. By using a bit size of 512, a pair of keys - a public and a private key is generated. The public key is used to encrypt data, while the private key is used to decrypt data. These keys can be used to encrypt and decrypt our full name.
14 Question 4 In the example, I used the hybrid encryption process to encrypt the name "Mazen Saleh Alghamdi." The first step was to generate a symmetric key using the AES algorithm ( Savka et al., 2021). The resulted ciphertext was then encrypted with the RSA algorithm using the previously generated public and private keys. The encrypted data is now securely stored and can only be accessed by the private key owner. In conclusion Hybrid encryption is a powerful tool for protecting data from unauthorized access. Combining two different encryption algorithms provides an extra layer of security that would be difficult to achieve with either algorithm alone. This makes it an ideal choice for organizations that need to securely store sensitive data, such as financial and medical information. References
15 Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications , 9 (4), 289-306. Savka, I., Yanovskyi, Y., Lazarovych, I., & Kozlenko, M. (2021). Visualization of advanced encryption standard cipher using CrypTool.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help