BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #2 Total Marks: XXXXXXXXXX%) Submit your answers to the following questions by Week-3 Friday...

1 answer below »
hkwhk


BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #2 Total Marks: 15 (7.5%) Submit your answers to the following questions by Week-3 Friday 5:00PM. Late submissions will incur 5% deduction with each passing day till Week-4 Friday 5:00PM, after which no submissions will be accepted. Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend’s work. Cite and provide reference (Harvard Style) to the original work where applicable. Questions: Q. #1: What is a Hash function? What is its main usage in information security? Perform the following practical task: 1. Go to https://emn178.github.io/online-tools/sha256.html. 2. Enter your full name as input, calculate its SHA256 hash, and share the result. 3. Append a dot (.) to your name, calculate its SHA256 hash, and share your result. 4. Do they match? 5. Remove the dot (.), is the hash value same as before? (2.5 Marks) Q. #2: What is the difference between symmetric and asymmetric cryptography? Perform the following practical task: 1. Pair up with one of your class-mates for this exercise. (If not feasible, get the help from any other friend). Exchange email addresses with your partners. 2. Go to https://www.devglan.com/online-tools/rsa-encryption-decryption. 3. Each student must generate their RSA public and private key pair by using the above link. Email your public key to your partner. (Attach the screenshot of the email that you sent). 4. Copy and paste your private key here in you answer. (Do not share it with your partner) 5. Use your partner’s public key to encrypt a message that must include your name in it. (Hint: Use the left column of the webpage for encryption, and use public key of your friend). The message must not be inappropriate. Example: “I am David and I love to play squash” 6. Email the encrypted message to your partner. Your partner will do the same and will send you an encrypted message. Share the screenshots. 7. Decrypt the encrypted text sent by your partners using the same link. (Hint: Use the right column of the webpage for decryption, and use your private key). Share the screenshot. 8. Were you able to recover the cyphertext? Email the plaintext (recovered text) to your friend. (5 Marks) Q. #3: Write the process of generating Digital Signatures in your own words? Create a flow chart of the process using pen and paper, take its photo and attach. (5 Marks) https://emn178.github.io/online-tools/sha256.html https://www.devglan.com/online-tools/rsa-encryption-decryption BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Q. #4: What are Digital Certificates and what is their usage? What weakness in Digital signatures led towards Digital Certificates? (2.5 Marks) * Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning, United States. Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile.
Answered Same DaySep 17, 2021

Answer To: BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney...

Ali Asgar answered on Sep 17 2021
140 Votes
A1.
Hash function:
A hash function in cryptography (or information security) takes a data input of any length and converts it into ciphered text of fixed length. This is called a Hash value or Hash. This has
h can then be stored in place of actual password to be used at later stage for verification. These hash values are sometimes also known as Message Digest.
The main advantage of Hash is that:
· They are irreversible, that is the original password cannot be created from the hash value.
· A slight change in the original value changes the hash significantly, thus making it difficult to guess
· A password always generates the same hash every time.
· It is very difficult to find two different passwords having same hash values.
· The hash value is not predictable from the password.
The use of Hash Functions in Information security:
· Hash functions are extensively used to transmit confidential information like passwords, or payment credentials etc over unsecure communication channels. Since the transmitted message only contains the digest, any attacker cannot know the actual password of the user.
· It is also widely used in storing confidential data like passwords and other credentials in the database. Since a password is not stored in plain text, it cannot be stolen using SQL injection techniques.
· It is also used to ensure integrity of the message. A digest is also transmitted with the actual message so that when ever someone tries to or there is an arbitrary change in the data due to bit faults or transmission errors, it can be easily caught.
Practical Task:
2. Full Name: Arsalan Ahmad
SHA256 Hash: 5d914ce701ad784f5225aec5dc48b922964591d82d0e09905bddb44f05296507
3. Full Name with Dot (.): Arsalan Ahmad.
SHA256 hash: 39b6074ecb71fc4aac9527d048b7bf17a2d26da2ae1e4894ed3a4cb5b3149d7e
4. No they do not match. There is a significant change.
5. Yes the value after removing dot is same as before.
A2.
Difference between symmetric and asymmetric key:
    Asymmetric Key Encryption
    Symmetric Key Encryption
    It is done using two separate keys,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here