Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend's work. Cite

image text in transcribed
Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend's work. Cite and provide reference (Harvard Style) to the original work where applicable. Questions: Q. H1: What is a Hash function? What is its main usage in information security? Perform the following practical task: 1. Go to https/icmnl78. github.jo'online-tooks/shn256.html. 2. Enter your full name as input, calculate its SHA256 hash, and share the result. 3. Append a dot (.) to your name, calculate its SHA256 hash, and share your result. 4. Do they match? 5. Remove the dot (.). is the hash value same as before? (2.5 Marks) Q. 12: What is the difference between symmetric and asymmetric cryptography? Perform the following practical task: 1. Pair up with one of your class-mates for this excrcise. (If not feasible, get the help from any other friend). Exchange email addresses with your partners. 2. Go to hetps '/ www devglan. comionline-toolsi rsil-cricryption-decryption. 3. Each student must generate their RSA public and private key pair by using the above link. Email your public key to your partner. (Attach the screenshot of the email that you sent). 4. Copy and paste your private key here in you answer. (Do not share it with your partner) 5. Use your partner's public key to cnerypt a message that must include your name in it. (Hint: Use the left column of the webpage for eneryption, and use publie key of your friend). The message must not be inappropriate. Example: "I am D avid and I love to play squash" 6. Email the enerypted message to your partner. Your partner will do the same and will send you an enerypted message. Share the sereenshots. 7. Decrypt the encrypted text sent by your partners using the same link. (Hint Use the right column of the webpage for decryption, and use your private key). Share the screcnshot. 8. Were you able to recover the cyphertext? Email the plaintext (recovered text) to your friend. (5 Marks) Q. H3: Write the process of generating Digital Signatures in your own words? Create a flow chart of the process using pen and paper, take its photo and attach. (5 Marks) BISY3006TSYY003/ISY203 Information Secarity (4) Australian Institute of Higher Education, Sydney Q. H4: What are Digital Certificates and what is their usage? What weakness in Digital signatures led towards Digital Certificates? (2.5 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions