Differences between revisions 1 and 16 (spanning 15 versions)
Revision 1 as of 2017-01-29 19:44:34
Size: 1747
Editor: scot
Comment:
Revision 16 as of 2021-02-25 17:34:27
Size: 2366
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
The purpose of this lab is to introduce you to symmetric encryption algorithms and their uses and weaknesses. You will need a partner for this lab. In addition to classic encryption (e.g. substitution ciphers such as the Vigenère cipher) we consider 3DES, AES and BlowFish. The purpose of this lab is to introduce you to symmetric encryption algorithms and their uses and weaknesses. In addition to classic encryption (e.g. substitution ciphers such as the Vigenère cipher) we consider 3DES, AES and !BlowFish.
Line 9: Line 9:
 1. Encrypt and Decrypt using AES, 3DES and BlowFish.
 1.Research password security applications.
 1. Encrypt and Decrypt using AES, 3DES and !BlowFish.
 1. Research password security applications.
Line 13: Line 13:
You will need a windows machine (you may use your virtual machine if you like)
Lab Operations
You will need a Ubuntu machine (you may use your virtual machine if you like)
Line 16: Line 15:
Decipher the message below. Hint: The key is two words and a total of 15 letters long. For this, download cryptographytools from the wiki. For your convenience, the encrypted message is given below: == Lab Operations ==

Decipher the message below. Hint: The key is two words and a total of 15 letters long. For this, find your own tool online. For your convenience, the encrypted message is given below:
Line 25: Line 26:
/* https://www.boxentriq.com/code-breaking/vigenere-cipher */
Line 30: Line 33:
|| || ||
|| || ||
|| || ||
|| || || ||
|| || || ||
|| || || ||
Line 36: Line 39:
 1. In a Word Document include the key and your decryption of the message above.  1. In a Word Document include the key you believe unlocks the message above.
 1. Encrypt the plaintext message with your southern username as the key and the AES-256-CBC algorithm (with the pbkdf2 option) provided by {{{openssl}}}. If your username is not long enough, repeat it with no spaces. Turn in the encrypted file with your Word Document. For example I used the following two commands to encrypt and decrypt the plain.txt file. If you use something different please document it in your Word document.
    1. {{{openssl aes-256-cbc -pbkdf2 -a -in plain.txt -out cipher.txt}}}
    1. {{{openssl aes-256-cbc -pbkdf2 -a -d -in cipher.txt -out recovered.txt}}}

Lab 04 - Symmetric Cryptography

Introduction

The purpose of this lab is to introduce you to symmetric encryption algorithms and their uses and weaknesses. In addition to classic encryption (e.g. substitution ciphers such as the Vigenère cipher) we consider 3DES, AES and BlowFish.

Lab Goals

  1. Decrypt a recently discovered Vigenère cipher, and determine why it is not safe to use classic encryption algorithms.
  2. Encrypt and Decrypt using AES, 3DES and BlowFish.

  3. Research password security applications.

Setup

You will need a Ubuntu machine (you may use your virtual machine if you like)

Lab Operations

Decipher the message below. Hint: The key is two words and a total of 15 letters long. For this, find your own tool online. For your convenience, the encrypted message is given below:

SEAN WIEUIIUZH DTG CNP LBHXGK OZ BJQB FEQT XZBW JJOY TK FHR TPZWK PVU RYSQ VOUPZXGG OEPH CK UASFKIPW PLVO JIZ HMN NVAEUD XYF DURJ BOVPA SF MLV FYYRDE LVPL MFYSIN XY FQEO NPK M OBPC FYXJFHOHT AS ETOV B OCAJDSVQU M ZTZV TPHY DAU FQTI UTTJ J DOGOAIA FLWHTXTI QLTR SEA LVLFLXFO

Research: What password managers are available today? List the top 3 popular ones and reference sites that helped you determined which ones were popular. What algorithms do each of these use?

Top three Apps in order Algorithm(s) used

Top App Names in order

Algorithms Used

Reference Link

Show Me

  1. In a Word Document include the key you believe unlocks the message above.
  2. Encrypt the plaintext message with your southern username as the key and the AES-256-CBC algorithm (with the pbkdf2 option) provided by openssl. If your username is not long enough, repeat it with no spaces. Turn in the encrypted file with your Word Document. For example I used the following two commands to encrypt and decrypt the plain.txt file. If you use something different please document it in your Word document.

    1. openssl aes-256-cbc -pbkdf2 -a -in plain.txt -out cipher.txt

    2. openssl aes-256-cbc -pbkdf2 -a -d -in cipher.txt -out recovered.txt

  3. In the same Word document, place a table containing the top 3 apps you identified, algorithms a link to your references.

NetworkSecurity/Lab/Lab04 (last edited 2021-02-25 17:34:27 by scot)