Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask E-Commerce Expert

Assignment

Make a screen capture showing the fingerprint generated by the key creation process and paste it into your Lab Report file.

Introduction

As computers, tablets, phones and other "always on" digital devices become increasingly interconnected through unsecure public networks, threats against our privacy and digital security increase in kind. Threats like identity theft and credit fraud threaten our financial security. Digital stalking and online harassment threaten our physical and emotional security. Some suggest that digital surveillance, mass data collection, and data mining by government and commercial entities encroach on our right to free speech, our freedom of association, and our Constitutional protections against unlawful search and seizure.

The need to protect confidential and private information over "public" networks is an ancient one. The solution then, as now, is to encode private data using cryptography. Simply put, cryptography takes human readable information and makes it unreadable "cipher text" which can only be read if one possesses the correct key. Generally speaking there are three cryptographic standards: symmetric cryptography, asymmetric cryptography, and hybrid cryptography.

With symmetric cryptography the sender and receiver use the same key (or "shared secret") to encrypt and decrypt a given message. Symmetric cryptography is quite fast and generally easier to implement than asymmetric cryptography. However, while symmetric cryptography does provide confidentiality and integrity, it does not guarantee authenticity. In other words, you do not know for certain who gave you the encrypted message.

With asymmetrical encryption, the sender has two keys: a private key and a public key. The sender encrypts with her private key and the receiver decrypts using the sender's public key, which the receiver obtains from the sender or through a trusted third party, such as a certificate server. While asymmetrical encryption is slower and more complex than symmetrical encryption, it does guarantee the authenticity of the sender.

The hybrid approach is to have the sender encrypt the message with a symmetric key, and then send the message and a copy of the symmetric key using the sender's asymmetric public key. The initial message and symmetric key are decrypted using the sender's public key, and subsequent messages are then decrypted quickly using the symmetric key. The hybrid approach provides the same full CIA protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.

In this lab, you will learn how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You will use Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You will use the sender's keys to encrypt a file, send it to the receiver, and decrypt it using the receiver's copy of the keys.

This lab has five parts which should be completed in the order specified.

In the first part of the lab, you will create a public and private key pair for the senders account on the vWorkstation desktop.

In the second part of the lab, you create a public and private key pair for the receiver's account on the remote desktop, TargetWindows01.
In the third part of the lab, you will transfer and import the public key from the receiver, TargetWindows01.

In the fourth part of the lab, you will encrypt a file on the vWorkstation desktop using the receiver's public key and the sender's private key, send it to the remote machine, and then decrypt the file.

Finally, if assigned by your instructor, you will explore the virtual environment on your own in the third part of the lab to answer a set of challenge questions that allow you to use the skills you learned in the lab to conduct independent, unguided work, similar to what you will encounter in a real-world situation.

Learning Objectives

Upon completing this lab, you will be able to:

Apply the concepts of common cryptographic and encryption techniques to ensure confidentiality

Understand public and private key pairs and basic asymmetric cryptography

Generate a public and private key pair

Encrypt a data message using a public and private key pair

Decrypt a data message using a public and private key pair

Tools and Software

The following software and/or utilities are required to complete this lab. Students are encouraged to explore the Internet to learn more about the products and tools used in this lab.

FileZilla

GPG4Win (Kleopatra).

E-Commerce, Computer Science

  • Category:- E-Commerce
  • Reference No.:- M92100589
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in E-Commerce

Assignment requirementsyour web site proposal and

Assignment Requirements Your web site proposal and presentation (Assignment 1) was accepted, subject to any feedback you may have received. You company has been asked to develop website you suggested and build the featur ...

Html - css assignments assignment 1 - internet programming

HTML - CSS Assignments Assignment 1 - Internet Programming   My grandfather, like many men who lived in rural America, owned a large machine shed where he stored tools, farm equipment, vehicles, lumber, and wonderful gad ...

Purpose of the assessment with ulo mapping students are

Purpose of the assessment (with ULO Mapping) Students are required to design and develop four different Apps. Students will be able to: b. Apply Java programming concepts, models/architectures and patterns to Android app ...

Create testcase for given project first use piki design to

Create testcase for given project, first use piki design to do test case Want to do it like testcase one file and you can also get right information from saeed testcases Want to piki design all of it and informat like te ...

Assignment - creating dynamic websites and web-based

Assignment - CREATING DYNAMIC WEBSITES AND WEB-BASED APPLICATIONS - AN OVERVIEW This assignment is an overview of the concepts, technologies and design techniques required to build dynamic websites and web-based applicat ...

Research and discuss html 5what are its main featureswhat

Research and discuss HTML 5. What are its main features? What resources are available to support it? Put it in your own words please.

Overviewassignment 2 asked you to build the front end of

Overview Assignment 2 asked you to build the front end of the assignment, now the client wants you to build the full eCommerce website to the point that orders can be made and stored in a spreadsheet. Requirements 1. Web ...

Secure electronic commerce assignment -part a -based on

Secure Electronic Commerce Assignment - Part A - Based on your practices in labs, develop an online e-commerce (shopping) system using html, javascript and php. You can assume any products for sales. Please create a fold ...

Mobile applications assignment - an ios recipe application

Mobile Applications Assignment - An iOS Recipe Application - Introduction - In this assignment, you will create a simple Recipe application for iOS using Xcode (Swift). This application allows users to view food recipes. ...

Mobile web application development assignment - android

Mobile Web Application Development Assignment - Android Apps Development Purpose of the assessment - Students are required to design and develop four different Apps. Apply Java programming concepts, models/architectures ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As