Answered step by step
Verified Expert Solution
Question
1 Approved Answer
i need to do this task using virtual machine https://seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_Encryption/ from this i need to do task 2,3,7 https://seedsecuritylabs.org/Labs_16.04/PDF/Crypto_Encryption.pdf this document 8 Task 7: Programming
i need to do this task using virtual machine https://seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_Encryption/ from this i need to do task 2,3,7 https://seedsecuritylabs.org/Labs_16.04/PDF/Crypto_Encryption.pdf this document 8 Task 7: Programming using the Crypto Library This tank is mainly designed for sbalents in Ceenputer Sciencel Fegincering or related fields, whene progrataming is required. Students should check with their pooleswan to see whether this lask is required lor their ceraries or noth. In this task, you are given a puaintest and a cightertest, and your job is wo find the key that is med for the encryption. You do know the follensing facts: - The aes 1.2s-chec cipher is aned for the encryption. - The key used to cecrypt this plaintext is an English word shorter than 16 characters; the wond can be found from a typical English dictionary. Since the word has less than 16 characien fie. 128 titsh porad sigen ( 2 : hexadecimal value is 023 ) are appended to the end of the word to form a ke? of 128 bits. Your goal is to wnse a peogram so tind cot the encrypeion key, You can derwnload a Fingfish woed list from the leeernet. We have also linked one on the web poge of this lab. The plainted, cighertext, and IV are listed in the follosing: VIadficext feotal 21 charactera) t. Thin is a top aecret. SE.E.D Labs - Secret-Key Fneryption Lab 7 IV its hex formati: You nced to pay atication to the folloraing issuck - If you chonse to stoee the plainiest message in a file, and feod the file so year program. you nocd ta check whether the flle length is 21. If you type the menage in a rect edibor, yoo need to be arware that scene editors may add a special character to the cod of the file. The catiest way to store the mesuge is a file is to use the folleraing command fthe a flag tells echo not to add a bailing nealiner. 1 with + a "Thia Is a top ancret. * b tile - In this takk, you are supposed to write your own program to imode the crypto library. No credit will be given if yoe simply use the opens s 1 commands to do this tack. Sample codle can be found frum the folkowing URT. - When you coengile yoer code using qCc, do soe forget no inclade the - letypt o flaph because your code necds the crypto library. See the following caanple: 5 gee to myenc mynne, o - icrypto Note to instructors. We enccerage instructors to gencrate their own plainted and cipherieut tsing a different key; this way students will not be able lo get the answer from another place or from prevous courses. Instructors can use the following conimands to achieve this goal iplease seplace the word example with asceher secret word, asd add the correct eamber of t signs to nuke the length of the string to he like
i need to do this task using virtual machine
from this i need to do task 2,3,7
https://seedsecuritylabs.org/Labs_16.04/PDF/Crypto_Encryption.pdf
this document
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started