Objective:
The objective of this assignment is to explore Information Security and Assurance (IS&A)concept and application using Cryptography. Through this assignment, you are required to do secondary research in addressing some of the challenges you will encounter. The final submission must be in a report format (as per the sample posted on blackboard).
Deliverables: A single report document answering all listed questions or with results of activities. The final document must meet the submission requirements at the end of this document.
Part A: Cryptography (100 Marks)
Search the Web for “steganographic tools.” What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file? [25 Marks]
Generating and Comparing Hashes [35 Marks]
In this activity, you will download and compare the results of various hashes.
Go to the web site http://implbits.com/products/hashtab/ and download Hash Tab for
Personal use (Free) (latest version) for windows.
Install the tool.
Create a document (using a text editor such a notepad or Word document etc. Please note
that notepad is install be default on all the virtual machine used in Assignment 1 and 2). Write some sample text inside (e.g. “Now is the time for all good men and women to
come to the aid of their country.”). Save the file in a convenient folder and with an appropriate name (e.g. country1.txt). Close the file.
Create another file with almost similar content, but not exactly same, e.g. leaving the last period in the text above, and save it (e.g. as country2.txt). Close the file.
Now in the folder where the word file is saved, right click on the file name to see the properties of the file. You’ll see a new tab, File Hashes.
Click this tab to see the hashes for this file.
Click on Settings. Click the “Select None” , click on OK
Click on Settings, select SHA-1. click OK.
Scroll through the different hash values generated. Click “Compare a file”.
Navigate to the file country2.docx and then click OK.
A hash is generated on this file. Give your detailed observation and screenshots about the result comparison and the tool in general
3. Based on course content and other materials complete the following Asymmetric Cryptography questions(Tip: Refer the lecture slides for this week). [40 Marks]
Action
Whose key to use
Which key to use (Public or Private)
Explain
Peter wants to send Susan an encrypted message
private)
Susan wants to read an encrypted message sent by Peter
Peter wants to send a copy to himself of the encrypted message that he sent to Susan
Peter receive an encrypted reply message from Susan
Peter wants to send Susan a message with digital signature
Susan wants to see Peter’s digital signature
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here