ISSC 364 Week 4 Lab

docx

School

American Military University *

*We aren’t endorsed by this school

Course

364

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by fighters18jfighters18j

Report
ISSC 364 Week 4 Lab John Caldwell Anthony Gayles 27 Feb 2023
O [ vessirmes x| ot % v = | e G ¢ Hihatsizecom 5 = @ @ 3 mpontmertes | 0 0 mpsiimensosn. @ Voulws G Mapr M G O Gucklie M. G BoomCarss (51 BoomCace 1 Academy Morgage Omermerter 148 cuoE TE ¢« XX 5% * Introduction + Section 1: Hands On Demonstration v Part 1: Ceate Encryption Keys Part 2:Sign a Document with a ighal Sgnature Part 3: Verify the Digital Signature and Read the Signed Fil Part 2:ign a Document with a Digital Signature (1/1 completed) the compressed and ASClkencoded data, and the plaintext sage can only be retrieved by decoding and decompressing the il i 9 Make a screen capture showing the contents of the 3 oncmeres 10. At the command prompt, type cp signed message /tmp ‘and press Enter o copy the newly created signed_message il Into the temporary directory where Matthew Hurter can Qe I O W @G @R ~fAGON = O | ekt hsiomen x| { St B (v <& - o x & G A nwps/pHunaszecon - 3 importtovrtes | 0 0 Wpeiimennspsn. @ Voulsbe G Mapr M sk O Quiklnks - Mpde. 5 BoomCards G Boom Cards 1 Academy Morigage Otrerovortes A8 e TR « " Intoducton tructoreTargetLinuxtl: S gpg -verify /tup/signed message Par 1 rese Encyprion Keys : S v S 3 80 03 -5 10 o0 Part 2 Sgn a Document wih a il Sgnaurs oo sigatre froa” Roger Stevrs Part3: Vet theDigtal Signatureand Read the Saned il Part3: VertytheDighal Signatue and Read the Signed Fle (11 completed) * Section 1: Hands-On Demnstration v Note: Despite the use of the ~-daczypt flag in the GPG command, there is no real encryption/decryption used on this file. The command simply decomy readable format. GPG will show not only the contents of the original me s the file nto its orginal ge but also the digial signature verification. Because there is not necessarlly any encryption on a digitally signed message, the recelver does not need the sender’s public Key in his keyring to view the contents with the -decrypt command. Remember, though, without the key,the receiver would not be able o verify the signature. If Matthew sent a signed message to Roger i return, he would 5ign the message with his private key. Upon receipt of the signed message, Roger could verify the signature against Matthew's public key, provided he had already Imported the key. 7. Make a screen capture showing the contents of the digitally signed message. Note: This concludes Section 1 of the lab @ awe wOEE®E B ~raGee oMo
| O | B Wekdlbsiommen x| { Jorestbaten ] (v <& - o x & G & hups/plnasizecom - 5 3 impotfovertes | 0 0 peimennspen. @ Voulube G Maps M Gk Gk ks Wit G Boom Corde 54 BoomCards 1 Academy Morigage Other s O gniaet - @ koot - Lopem- D 3 > NS 2001124 Enter Text o 5 Introduction 'Document the password you used o Secton . Hande0n Demanstston o Section 2 Applied Leaming BZUY @ Part 1: Create Encryption Keys o @ a2 Sgn s Document i aDighal Sgnaue ® 1: Create Encryption Keys (1/2 completed) - Q o e hew UNIK passwors sousorapassword oo rumbar; v bl Work Phone: eave blank Home Phone: v bk Oter.leae lnk 4. Document the password you used 1o create the B 5. From the Applications menu, log out of the root user session. [e) . o - oy aws O W €@ B NG Pe e O [ vessibrmes x| (ol H] (v [ - o x C a fbl-Hihatsize.com 2 s ¢t @ @ 3 mpsttmertes | 0 0 mpslmenspin. @ Voulubs G Mapr M Gmi O Gucklne M. G GoomCards 51 BoomCass 1 Academy Morgsge Omermrter Authenticating Encrypted Communications with Digital Signatures (3e) O g0t + W ropomi - Fowen- D 3 (> [N e S el GO A0 0@ nrnnn a P 30% Itroduction - <o Teiocation certificate store 2 */hone/cal w1 GPB/opETE- T s ——— s iooosroasacaTIDesIFSTeSF OB rev . i . > ilic and secret key crested 3nd signed. © + Section 2 Appled Learming v Part 1:Create Encryption Keys ircrebressomil 2 s O o Calauell catduet Part 2 Sign a Document with Digtl Sgnature 2023.02.26 161 lopires: 2025.02.23 ® Part 1: Create Encryption Keys (1/2 completed) L o Real name: youssame, replacingyoumame with your own ° o Emall adaress: 5 A D + Counge e (lomenert Exmatlor Olayanie:o iy s 0 1) e Tottimute] Jon Catdontt <c . rsa3072 2023-80.26 161 loxpire: 207-62- cata The key generation process wil begi. Depending on he activityon your system,this may take a few minutes to complte 1. Atthe command prom, execute apa —-armor --axport Instnsmaini t1aTemenrelshoondancnd. ave > Ikeys/ Lastaameini a1 PublicKey 1o wile the public ey o fil and store tha i natemporary iectoy, s t can be exported o other users 12. At the command prompt, execute apg —-14t-keys 0 vy tht the key s instaled i the public keyring, 13, Make a screen captureshoviing he key fingerprintfor (5] the kay pir you generated inthis part o the s = == s EOHEE® B ~ages e
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
D [@ wessrmmer: x| { beossbirar L ol a i hatsize.com £ importfavorites | [ [] mipsiiwwwnspsn.. YouTobe G Maps 148 cuoE TE ¢« i + Intoduction + Section 1:Hands On Demonsiraton > + Section 2 Applied Leaming b Part 1 Create Encrypion Keys Part 2 Sign a Document with a Digtl Signature Part 2:Sign a Document with a Digital Signature (0/1 completed) 2. Atthe command promps, execute the echo command to add Your own name, yourname, o the yourname.unsignedmessage.txt file. 3. At the command prompt, execute the echo command to ‘append the name of the school you are attending, yourschool, tothe yourame.unsignedmessage txt ile. 4. At the command promp, execute the echo command to append This is a test message that willbe ditally signed by my own user accountto the yourarme_unsignedmessage txt e 5. At the command prompt, execute the cat command to view the contents of the yourame. unsignedmessage 1 ile. 6. Make a screen capture shoving the contents of the (5 yourname_unsignedmessage.txt file 7. Atthe command prompt, execute gpg yourname_signednessage. txt —-sign N RrY—— ENEN o - £3 import vorkes x| (e e tisasizecom : B O pssmmnsiosn. LAB GUIDE TR & Part 1 Create Encryption Keys Part 2 Sign aDocument with a Digal Signsture Part3: Verfy the Dihal Signature and Read he Signed il + Section3:Challenge and Analysis > Part 3: Verity the Dightal Signature and Read the Signed Flle (1/4 completed) sttt st s, o et n ot ET T b a0 Yo ko Generate a new key pair 7. Make a screen capture showing he Kieopatra key pair (5 fingerprint. 8. Click Finish o lose the Key Pair Creation Wizard. M Gnai B Voulibe G Maps M Gned O e = © Quickliis - Mytla.. 51 Boom Cards: Fie %] (v < Gk Unks Wil 5 Boom Cars 5 B e 21 Academy Morgage jo Qe I O W @G @R BoomCarts 51 Academy Marigage Local Mk Fis Commands Sevion Qptons Bemote Help S B BP B @ @ et ®1230011 X G Newsesion Recyle i o Pbickey ool signed. Rpdetinn S Quewe - Tt Setings O e & Toos seings Key P Cresion W Key Pair Successilly Created Yot vy o s s il s o ol et nd o o e o pen oy oo gl P SRR T BB OB e s i of Yo oy . S oy By S, ad i ey ToGracary Ses, = STCTCRrET) @ o0 mE R e Q search Thidden oK mdar o x s - @ @ Omervertes o & a @ o & . ® @ © @ ~aGeN oM - 8 x 5 @ » A contrates - P Opentcr AEG R 0@
| O | I Weeka o signmen: G o E3 import vorkes x| (et nnen ptuatszecomn - O O pelmonspsn. @ voulse LAB GUIDE Tt Part 1:Create Encryption Keys Part 2: Sign a Document with a Digtal Signature: Part 3: Verfy the Dighal Signature and Read the Signed File + Section 3: Challenge and Analysis > Part 3: Verify the Digital Signature and Read the Signed File (2/4 completed) ey [ Certfy the Imported key 12 When prompted, certfy the certiicate for Matthew Hunter only and use Matthew Hunter's passphrase to unlock the. secret key. 13. Make a screen capture showing the successful certifcation message 14, Click Finish to close the Certify Certficate window. 15, From the Kleopatra tool bar click Decrypt/Veriy,then select % (v «[# ook L Myt 55 Boom Care BoomCarss 1 Acsdemy Marigage s Gommands Seson. Qptons Bemcts Hob BE Bopeonze WP B @ 5 O - @ @001 X | Rewseston Woesip @@ - B Tt Setings Octaat Vew et Tools Setings Window Holp CAUer AdminsoADektoph st Oucvotety | troat 4 e s Tyve o< Puert et 5 e T Tos Dacume 1 Shorew A contites wia U Centy Cemiste John Ctdwel Name Matthess hunter o ot ok Pubickey johncadaslsigned s RTmpsitine b ok <ty encnond s Voo s utormac o s FAmIE 0t Thiddn 080r3.K8 im0tz > Gy Qe ' O M O | D Wesks b Acsigrment. x| { Jooes & Barter X usven x[F L o v 3 [5] /jol-Htihatsize.com/lt =2304 . mpoimetes | 0 D) Wipe/manspan. @ Yoibe G Mape M Grad O Quckliks My 3 ook BoomCacs 51 Acery Mg Part 1: Create Encryption Keys Part 2:Sign a Document with Digtal Sgnature Part 3 Verfy the Digital Signature and Read the Signed File en + Section 3: Challenge and Analysis > Part 3: Verify the Digital Signature and Read the Signed File (3/4 completed) the TargetLinux01 machine. Successfuly Decrypt/Verly 16. Make a screen capture showing the successful decryption message. 17. Click Save Al 10 save the newily decrypted fileto the Workstation desktop, then close Kieopatra and open the 000t 47518 m0or A bk e Commands Sesion Optens ot ey BB E @ Srchorce WP (B @ | Qs = Tt etnas et B 10081723801 X G NewSesion O Oucoptty s - g =0 @@ e s bt e [ bt J Migursins onst A At Hame Arconteste o 2202023 Py clduel Puickey ol signez. s Rmpsctink Thaden 00o11KDin 017 Q searcn L Oo oew v OperbGh = 8 % = Other s Opentcr Operpn nsAM = o
| D | @ Wekatsbasiomen x| { hovesabaren % (v [ C o mpunszecn 230182 e @ @ 3 impottmertes | [ O Wopsiiwmenspen. @ Voulubs G Maps M Gma O QueklnksMpla. G foomCarss G BoomCas 51 Academy Morgage Other s 3 Gul 22 LAB GUIDE TR & « pedmessagee .- oo T ||, T Bl B Fomet Voo Hop TP johncaon Yoo L Part 1: Create Encryption Keys b Part 2: Sign a Document with a Digial Signature “Fhis s a test message that will be digitally signed by my aun user account to the johncaldeell unsignednessage. txt file" Part 3: Verfy the Digital Signature and Read the Signed File * Section 3: Challenge and Analysis > Part 3: Verify the Digital Signature and Read the Signed File (4/4 completed) (=] Successfuly DecryptVerly 16. Make a screen capture showing the successful a decryption message 17. Click Save Al 0 save the newly decrypted fle to the Workstation desklop, then close Kleopatra and open the decrypted fle i the Notepad application. 18. Make a screen capture showing the decrypted file i the g5 Notepad window. 2 B oo D
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help