Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The aim of this question is to provide you with a hands-on practice on some of the cryptographic primitives that you have seen in the

The aim of this question is to provide you with a hands-on practice on some of the cryptographic primitives that you have seen in the cryptography course. In particular, the symmetric, asymmetric and hybrid encryption algorithms. In order to do so, you will be using a teaching cryptographic tool named Cryptool.

CrypTool as introduced by its developers - is a comprehensive free educational program about cryptography and cryptanalysis offering extensive online help and many visualizations. In order to complete this question, you need to install CrypTool-1 1 on your personal computer/notebook. You can download it from the Cryptool-1 download page [2].

(a) A hybrid cryptosystem is a combination of symmetric and asymmetric system designed to solve the limitations of each type of cryptosystem while combining their advantages. In this exercise, you will be using a hybrid cryptosystem consisting of the combination of AES (symmetric) and RSA (asymmetric) cryptosystems. 1- Run Cryptool

2- Prepare plaintext file

a. Create a text file (.txt) that will serve as a file to encrypt using the hybrid cryptosystem from the menu bar, click on the menu file and select new to create file and may can use any text editor for this purpose. This file should include your first/last name and your student ID in the first line and any other text of your choice. Save this file as plaintextxxxx.txt (xxxx should be replaced with your student ID, for instance if the student ID is 430112211, the file name will be plaintext-430112211.txt).

3- Generate RSA key pair:

a. From the menu bar, click on the menu item: Digital Signatures/PKI -> PKI -> Generate/Import Keys, and follow the steps to generate RSA Key pairs (1048 bits). Use your last and first name as identifiers and use 1234 as a PIN code. (You should explain the role of this PIN code in your answer)

4- Export key pairs

a. After generating the keys, click on Show Key Pairs Button and from the next window, Select the key you have generated in step 3 and click on export PSE (PKCS#12). Again use 1234 as the PIN code. (You should explain why there are two PIN codes in your answer).

b. Save the file as privatekeys-xxxx.p12 (xxxx should be replaced with your student ID, for instance if the student ID is 430112211, the file name will be privatekeys -430112211.p12).

5- Hybrid cryptosystem: encryption process

a. Open the plaintext file you have created in step 1. Then, click on the following menu Item: Encrypt/Decrypt -> Hybrid -> RSA-AES encryption. This will show you the process of the hybrid encryption (Figure 2).

b. Using your own words, explain how a hybrid key cryptosystem works. c. Encrypt the plaintext file using the hybrid RSA-AES cryptosystem. During this process, you will use the public key that you have generated in

3. Explain each step of the process. Screenshots should highlight the progress of the encryption process and the output of each step (session key, Asymmetric keys, encrypted document, encrypted session key, and final output). You should explain each of the outputs.

d. Save the encrypted file as ciphertext-xxxx.txt (xxxx should be replaced with your student ID, for instance if the student ID is 430112211, the file name will be ciphertext - 430112211.txt).

References

[1] Cryptool project website, URL: http://www.cryptool.org , Last accessed on Jan 1, 2021

[2] Cryptool-1 download page, URL: https://www.cryptool.org/en/ct1/ , Last accessed on Jan 1, 2021.

Student name: Any name

Student ID: 20232023

Plaint text: University

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Case Studies In Business Data Bases

Authors: James Bradley

1st Edition

0030141346, 978-0030141348

More Books

Students also viewed these Databases questions

Question

Which should take place First , Authorization or authentication?

Answered: 1 week ago

Question

4. Explain the strengths and weaknesses of each approach.

Answered: 1 week ago