Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Lab Assignment: Steganography

Steganography is the practice of hiding a message or image within another message or image. People use this practice because an encrypted message may attract attention whereas an encrypted message that appears to be ordinary text may not. In this exercise,you will encrypt a message,and then take the encrypted message and make it appear more like an ordinary message so that it will not stand out. Next, you will take the steps to reverse the processes that you originally completed.

Instructions

• Capture a screen shot as you complete each one of the lab steps and paste it in the designated spot below each step.

If there is a question in a step, your response should be included directly under the screenshot of that step.

Lab Steps:

1. Go to the JavaScrypt Encryption and Decryption page, located athttp://www.fourmilab.ch/javascrypt/javascrypt.html

2. Create a key and enter it into the textbox under the "Key" section. (The text option button under the textbox should be selected.) Next, click the "Generate" command button. Copy the contents of the "Key" textbox into a text editor file, such as Notepad, and save it.

3. Then, go to the "Plain Text" box immediately underneath the "Key" text box and enter text that you want to be encrypted. (The "Codegroup" option button under the textbox should be selected.) Click the "Encrypt" command button.

4. Look at the "Cipher Text" text box located belowthe "Encrypt" command button. Explain what is there.

5. Go back to the "Plain Text" text box and click the "Clear" command button. Next, go back to the "Cipher Text" text box and click the "Decrypt"command button.

6. Look back in the "Plain Text" text box. What do you see? Discuss what happened.

7. Click the "Clear" option button under the "Plain Text" text box.Next, go back to the "Key" text box and click the "Clear" command button. Then,go back to the "Cipher Text" text box and click the "Decrypt" option button. What happens? Why? What do you see in the "Plain Text" text box?

8. Next,go to the "Key" text box and enter the generated key from Step 2.Then, go back to the "Cipher Text" box and click the "Decrypt" command button. What do you see in the "Plain Text" text box? What happened and why?

9. Copy the contents of the "Cipher Text" text box to another location. You will need it in a couple of steps.

10. Go to the "Stego! Text Steganography" page, located athttp://www.fourmilab.ch/javascrypt/stego.html

11. Paste the cipher text into the "Cipher Text" text box.

12. Click the "Hide"command button under the "Cipher Text"text box.Now, look at the "Hidden Text" text box. What happened and why?

13. Go back to the "Cipher Text" text box and click the "Clear" command button.

14. Next,go back to the "Hidden Text" text box and click the "Seek"command button. Look in the "Cipher Text" text box. What happened and why?

15. Click the "Select" command button and copy the text in the "Cipher Text" text box.Go back to the JavaScrypt Encryption and Decryption page, located at http://www.fourmilab.ch/javascrypt/javascrypt.html and paste the text into the "Cipher Text" text box.

16. Go back to the "Plain Text" text box and make sure that it is clear. If it is not, click the "Clear" command button. You also need to make sure that your key is entered as you left it before you went to the "Stego! Text Steganography" page.

17. Then, hit the "Decrypt"command button found under the "Cipher Text" box. What is in the "Plain Text" text box now?Discuss what happened.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91899739

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Since quotas do not raise revenues but have the same trade

Since quotas do not raise revenues but have the same trade effects as do tariffs, why not just have tariffs? Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenue ...

From the product designed expanded as follows1 from your

From the product designed expanded as follows. 1. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As