Lab-3-Encryption-12022023

docx

School

University Of Arizona *

*We aren’t endorsed by this school

Course

515

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

7

Uploaded by DrFlower11387

Report
Lab-3 - Encryption Contents 1. Personally Identifiable Information ................................................................................................. 1 2. Encrypt the file using symmetric key encryption ............................................................................ 2 1. I used Option-1: Encrypting the File ................................................................................................. 2 3. Obtain Media Digest (or hash) Values .............................................................................................. 3 1. One Open a browser to the following online MD5 hash calculator tool. ....................................... 3 2. Use the File Hash box, browse for the original word document (the summary) I created. ........... 3 3. Select and copy the MD5 hash value. ............................................................................................. 4 4. Now use the File Hash box again. ................................................................................................... 4 5. select and copy the MD5 hash value for this file. ........................................................................... 4 4. Steganography ................................................................................................................................... 5 1. I am going to use an online steganography tool to embed three things in an image: ................... 5 2. Use an online steganography tool. ................................................................................................. 5 5. References: ......................................................................................................................................... 6 Encryption I prepared Executive Summary for lab-3 – encryption. I attach all relevant files. The purpose of lab-3 is to familiarize us with various aspects of encryption. I work presently in Cognizant, where encryption is one of the key security aspects that are being taken care of. Encryption plays the single-most vital role in information security and in protecting privacy. 1. My First and Last Name: Debsankar Pramanik 2. Date: 12/02/2023 3. Name of the Lab : Lab-3. Executive Summary: 1. Personally Identifiable Information I researched on Personally Identifiable Information. The PPI for me are as follows:’ Name: Debsankar Pramanik
Email: debsankar1980@yahoo.co.in DOB: 02/08/1980 SSN: 682167854 DL: F1688705 it is important to protect PII because if it gets into unauthorized persons, there would be misuse by various extent, ex: identity theft, stealing money from bank account. 2. Encrypt the file using symmetric key encryption 1. I used Option-1: Encrypting the File 1) Use one of the following online file encryption program to encrypt my word document. I Used http://lazarsoft.info/crypter.html for encryption of the word document Entered encryption key (or password):
Selected “File” for the input type and used the “Browse” button to attach my file. Used the “Encrypt” button to encrypt my word file. Once encrypted, I am presented with an option to download the file to my local computer. I will submit this file as one of my deliverables. 3. Obtain Media Digest (or hash) Values 1. One Open a browser to the following online MD5 hash calculator tool. a. http://www.fileformat.info/tool/hash.htm 2. Use the File Hash box, browse for the original word document (the summary) I created. This would be the one before encryption. Click on the Hash button. Deb-Lab-3-Personally %20Identifiable%20Info
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3. Select and copy the MD5 hash value. Save it and make a note that this represents the original unencrypted file. It will look something like: MD5: bc678085155554d5df61c0a057f6a61e 4. Now use the File Hash box again. Browse for the encrypted version of the file. Click on the Hash button. 5. select and copy the MD5 hash value for this file. Note that it is different than the hash in step (3). Because the encryption process changed the content. Save this value also and make a note that it is the hash value for the encrypted version of the file. MD5 = 6471c49fd7a7585e6ee934d27b1ac8b6
4. Steganography 1. I am going to use an online steganography tool to embed three things in an image: The password I used to encrypt the summary document in Step 2 above The MD5 hash value for the unencrypted file The MD5 hash value for the encrypted file 2. Use an online steganography tool. From time-to-time, these tools become unavailable. Choose one and let me know which tool you use. Here we use https://manytools.org/hacker-tools/steganography-encode-text-into-image/ . i. Enter my information into the message box: The password I used to encrypt the summary document in Step 2 above: Mitawife+26 The MD5 hash value for the unencrypted file: bc678085155554d5df61c0a057f6a61e The MD5 hash value for the encrypted file 6471c49fd7a7585e6ee934d27b1ac8b6 ii. Click the “Browse” button under the “Host-Image” and select your graphic file. This can be a small picture or a logo graphic file (typically a .jpg file).
iii. Click the “Stegonogra-fy!” button 5. References: Encrypting entire file: http://lazarsoft.info/crypter.html -- Used the link for encryption of the word document Steganography tool: https://manytools.org/hacker-tools/steganography-encode-text-into- image/ online MD5 hash calculator tool. http://www.fileformat.info/tool/hash.htm
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Steganography (encode text into image) -> https://manytools.org/hacker- tools/steganography-encode-text-into-image/