Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

i need to do this task using virtual machine https://seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_Encryption/ from this i need to do task 2,3,7 https://seedsecuritylabs.org/Labs_16.04/PDF/Crypto_Encryption.pdf this document 8 Task 7: Programming

i need to do this task using virtual machine image text in transcribed
https://seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_Encryption/
from this i need to do task 2,3,7
https://seedsecuritylabs.org/Labs_16.04/PDF/Crypto_Encryption.pdf
this document
8 Task 7: Programming using the Crypto Library This tank is mainly designed for sbalents in Ceenputer Sciencel Fegincering or related fields, whene progrataming is required. Students should check with their pooleswan to see whether this lask is required lor their ceraries or noth. In this task, you are given a puaintest and a cightertest, and your job is wo find the key that is med for the encryption. You do know the follensing facts: - The aes 1.2s-chec cipher is aned for the encryption. - The key used to cecrypt this plaintext is an English word shorter than 16 characters; the wond can be found from a typical English dictionary. Since the word has less than 16 characien fie. 128 titsh porad sigen ( 2 : hexadecimal value is 023 ) are appended to the end of the word to form a ke? of 128 bits. Your goal is to wnse a peogram so tind cot the encrypeion key, You can derwnload a Fingfish woed list from the leeernet. We have also linked one on the web poge of this lab. The plainted, cighertext, and IV are listed in the follosing: VIadficext feotal 21 charactera) t. Thin is a top aecret. SE.E.D Labs - Secret-Key Fneryption Lab 7 IV its hex formati: You nced to pay atication to the folloraing issuck - If you chonse to stoee the plainiest message in a file, and feod the file so year program. you nocd ta check whether the flle length is 21. If you type the menage in a rect edibor, yoo need to be arware that scene editors may add a special character to the cod of the file. The catiest way to store the mesuge is a file is to use the folleraing command fthe a flag tells echo not to add a bailing nealiner. 1 with + a "Thia Is a top ancret. * b tile - In this takk, you are supposed to write your own program to imode the crypto library. No credit will be given if yoe simply use the opens s 1 commands to do this tack. Sample codle can be found frum the folkowing URT. - When you coengile yoer code using qCc, do soe forget no inclade the - letypt o flaph because your code necds the crypto library. See the following caanple: 5 gee to myenc mynne, o - icrypto Note to instructors. We enccerage instructors to gencrate their own plainted and cipherieut tsing a different key; this way students will not be able lo get the answer from another place or from prevous courses. Instructors can use the following conimands to achieve this goal iplease seplace the word example with asceher secret word, asd add the correct eamber of t signs to nuke the length of the string to he like

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions