Using_Encryption_to_Enhance_Confidentiality_and_Integrity_4e_-_Alejandro_Benavides
pdf
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
422
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
13
Uploaded by mrvidez
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
Student:
Email:
Alejandro Benavides
alejandro.benavides@mycampus.apus.edu
Time on Task:
Progress:
8 hours, 9 minutes
94%
Report Generated:
Thursday, March 7, 2024 at 9:11 PM
Section 1: Hands-On Demonstration
Part 1: Create and Exchange Asymmetric Encryption Keys
9.
Make a screen capture
showing the fingerprint for your key pair.
Page 1 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
22.
Make a screen capture
showing the fingerprint for Alice’s key pair
.
30.
Make a screen capture
showing your public key in Alice’s certificate cache
.
Page 2 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
35.
Make a screen capture
showing Alice’s public key in your certificate cache
.
Part 2: Encrypt a File Using Asymmetric Encryption
9.
Make a screen capture
showing the successful signing and encryption
message
.
Page 3 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
12.
Make a screen capture
showing the ciphertext
.
Part 3: Decrypt a File Using Asymmetric Encryption
15.
Make a screen capture
showing the Decrypt/Verify Files window
.
Page 4 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
18.
Make a screen capture showing the decrypted
secret-message.txt file in Notepad
.
Page 5 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
Section 2: Applied Learning
Part 1: Create an Asymmetric Key Pair
10.
Make a screen capture
showing the
instructor’s key pair files
.
Part 2: Encrypt a File Using Symmetric Encryption
11.
Document
the password you used to symmetrically encrypt the file.
password
Page 6 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
13.
Make a screen capture
showing the ciphertext in the secretmessage_ENCRYPTED.txt
file
.
Page 7 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
16.
Make a screen capture
showing the
output of the ls command
.
Part 3: Transfer and Decrypt a File Using Hybrid Cryptography
Page 8 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
6.
Make a screen capture
showing the
encrypted contents of the secretkey_ENCRYPTED.txt
file
.
Page 9 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
17.
Make a screen capture
showing the
decrypted contents of the secretkey_DECRYPTED.txt
file
.
Page 10 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
21.
Make a screen capture
showing the
contents of the secretmessage_DECRYPTED file.
Page 11 of 13
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
Section 3: Challenge and Analysis
Part 1: Digitally Sign a Document Using GPG
Make a screen capture showing the key fingerprint for the key pair you generated in this part of
the lab
.
Page 12 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Encryption to Enhance Confidentiality and Integrity (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 05
Make a screen capture
showing the
contents of the unsignedmessage.txt file
.
Part 2: Verify the Digital Signature Using Kleopatra
Make a screen capture
showing the
successful signature verification on the signed message
file.
Incomplete
Powered by TCPDF (www.tcpdf.org)
Page 13 of 13