Calculate how long it would take to do the encryption

Assignment Help Other Subject
Reference no: EM131616357

Assignment: Cryptography

Question 1: Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be.

In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack, mitigation strategies and concluding reflection (100 words) on the adequacy of the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Your report should be maximum 2 pages and should contain relevant tables, calculations, a ranked list of threats (in terms of impact) and conclusions.

See the scoring sheet for this assignment, and ensure that your report fulfils the criteria listed.

Question 2: You are required to learn the GPG/PGP package using Linux Kali environment (learning the applications of private and public key cryptography to secure email messages and documents) to be able to answer the following questions. You should pair up with one of your class fellow to do this lab and record results and give commentary on the results.
If you do not have a class fellow then create two user accounts and you can encrypt using one account and descript using other account.

a) Generate keys of 2 different sizes for RSA encryption scheme and include these keys in the report.

b) Encrypt a file (text or binary) using 2 key sizes and include your results and note the observation

c) Create a file of close to 1 GB and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10 GBs of data.

d) Export your public key and discuss the reason why your exported key should be in ASCII format.

e) Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

f) You should work with your class fellow/or create two accounts to do this experiment and record your observation in the form of commands being used or procedure being followed and includeyour results.
I. Exchange your public key and your friend's public key using email.
II. Import your friend's public key into your key ring.
III. Encrypt a file using your friend's public key and send the encrypted file to your friend.
IV. Ask your friend to decrypt the encrypted file.
V. You can ask your friend to do the same thing.

g) Write a reflection report in 100 words about the role cryptography can play in ensuring right to privacy of individuals.

Verified Expert

Solution file is prepared in ms word which discussed about the recent security vulnerability of wannacry ransom and it performance and mitigation security. This report also discussed about the GPG encrypt and decrypt the file in Linux kali environment. References are included as per APA format.

Reference no: EM131616357

Questions Cloud

What is the standard deviation for three month period : Assume a particular stock has an annual standard deviation of 34 percent. What is the standard deviation for a 3-month period?
Develop a sustainable competitive advantage : To develop a strategic plan, as a nonaccounting manager, you need to analyze and link management accounting data and performance information
Personal decision making processes the most : What are common barriers that affects someone's personal decision making processes the most? Discuss how the awareness of these barriers will help
Analysis of currently available network analyser tools : An analysis of currently available network analyser tools. The analysis should contain: Benefits, associated costs, ease of usability
Calculate how long it would take to do the encryption : Calculate how long it would take to do the encryption/decryption of a 10 GBs of data and Write a reflection report in 100 words about the role cryptography
Calculate the irr : Your brother wants to borrow $9,500 from you. He has offered to pay you back $12,250 in a year. If the cost of capital of this investment opportunity is 9 %?
What would be the impact on the development process : What are the key factors that help an organization decide what type of framework they should use to develop the supply chain?
Management within the project management environment : In light of this statement, discuss the debate surrounding Leadership versus Management within the project management environment.
How much will you pay for the companys stock today : Nickels Corporation will pay a $3.10 per share dividend. How much will you pay for company's stock today if you require a 12 percent return on your investment?

Reviews

inf1616357

10/9/2017 5:30:47 AM

This assignment was good one with good marks, really appreciate the expert, thank you and thank you specially to add the screen shots of lab work in the work prepared by you.

len1616357

8/28/2017 2:35:36 AM

Presentation Spelling and Grammar 5 The presentation’s content is appropriately written in English, with no spelling errors and grammar issues. Presentation and Style 5 The report is well presented, with diagrams, headings, tables and other visual aids. References 5 The report contains appropriate references and referencing style.

len1616357

8/28/2017 2:35:32 AM

Scoring Type Score Description Content 3 keys being generated 5 Keys of different sizes should be generated, contents of keys included and size estimated File encryption 5 File encryption with two keys and results included with observation Large file encryption 5 Analysis and observation of encryption time for large files ASCII format 5 Need for keys and encrypted files to be in ASCII format Key exchange for cryptography 5 Observation of key exchange and encryption and decryption Reflection on use of cryptography 10 Role of cryptography in ensuring right to privacy Subtotal: 35 Subtotal for content

len1616357

8/28/2017 2:32:27 AM

Scoring Q1: Type Score Description Content Fits with a profile 8 Appropriately choose a profile and stay within the parameters given. Reports that go outside the bounds will lose marks from this category. Profile completion 10 Completes the problems identified within the profile. You gain marks for ensuring that all of the points mentioned in the profile are covered in your report. Law 5 Reports should cover the impact of the law on their profile International scope 12 Your problem is placed within the international security scene, appropriately justified and excellent concluding reflection. Subtotal: 35 Subtotal for content Presentation Spelling and Grammar 5 The presentation’s content is appropriately written in English, with no spelling errors and grammar issues. Presentation and Style 5 The report is well presented, with diagrams, headings, tables and other visual aids. References 5 The report contains appropriate references and referencing style. Subtotal: 15 Subtotal for presentation Total: 50

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd