Now try it for yourself. Make a random text file and enter some readable sentences in there before encrypting and decrypting it as illustrated above. Question No answer needed Done You wish to encrypt a file called history_logs.txt using the AES-128 scheme. What is the full command to do this? Correct gpg -cipher-algo AES-128 - Answer Hint What is the command to decrypt the file you just encrypted? Correct gpg history_logs.txt.gpg Answer Hint Find an encrypted file called layer4.txt, its

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

2.

 

Now try it for yourself. Make a random text
file and enter some readable sentences in
there before encrypting and decrypting it as
illustrated above.
Question
No answer needed
Done
You wish to encrypt a file called
history_logs.txt using the AES-128 scheme.
What is the full command to do this?
Correct
gpg --cipher-algo AES-128 -
Answer
Hìnt
What is the command to decrypt the file you
just encrypted?
Correct
gpg history_logs.txt.gpg
Answer
Hint
Find an encrypted file called layer4.txt, its
password is bob. Use this to locate the flag.
What is the flag?
Answer format: ****(******
4 Submit
Transcribed Image Text:Now try it for yourself. Make a random text file and enter some readable sentences in there before encrypting and decrypting it as illustrated above. Question No answer needed Done You wish to encrypt a file called history_logs.txt using the AES-128 scheme. What is the full command to do this? Correct gpg --cipher-algo AES-128 - Answer Hìnt What is the command to decrypt the file you just encrypted? Correct gpg history_logs.txt.gpg Answer Hint Find an encrypted file called layer4.txt, its password is bob. Use this to locate the flag. What is the flag? Answer format: ****(****** 4 Submit
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY