Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Lab Requirements: Setup Download and install Linux Ubuntu 1 8 . 0 4 . 2 LTS version or any later version Virtual Machine at your
Lab Requirements:
Setup
Download and install Linux Ubuntu LTS version or any later version Virtual
Machine at your VMware Workstation or VirtualBox.
Objectives:
After completing this lab, you will be able to:
Encrypting files or data by using different types of symmetric cipher techniques.
Decrypting encrypted files.
Task#: Encrypting and decrypting files by using AES
Step# : Encrypting file by using AES
Log in to your Linux Ubuntu VM
List below the cipher with PGP after running this command
gpg version
Note: When you use a symmetric cipher to encrypt decrypt data or files, you will be
asked to enter a passphrase and then confirm it Your passphrase must be strong and do
not forget what you chose.
By using cat command, you can create a file with the name ao please use your
name convention and then press enter
Write the following line as a text inside this file:
This is my file which will be encrypted by AES
Press CtrlD to exit the editor
use the cipheralgo AES option to encrypt a file called aotxt
gpg symmetric cipheralgo AES aotxt
Enter your own Passphrase and confirm it again.
Check files in Linux as shown below, you will find there is a new file with the name
aotxtgpg is generated.
Open the content of this file by using cat command as shown below.
Here your file is encrypted by using AES cipher.
Step# : Decrypting the encrypted file.
To decrypt your file use your file name you need to run:
gpg o originalfile.txt d aotxtgpg
Check files in Linux again, will find there is a new file with the name originalfile.txt is
generated.
Double click on the originalfile.txt file, you will get decrypted file as below.
Task# : What to do:
By repeating step and step of Task # answer the following questions by providing the required
screenshots:
a What is Pretty Good Privacy GPG Mark
b Create a new text file aonewcheck note for the file name Mark
c Run Twofish to encrypt the new file and generate the cipher file. Mark
d Run Twofish to decryption on the cipher file. Mark
e Run DES to encrypt the new file and generate the cipher file. Mark
f Run DES to decrypt on the cipher file. Mark
g Conclusion: write what you learned from implementing assignment # Mark
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started