Can you enter plain key or do you have to use the encrypted

Assignment Help Computer Network Security
Reference no: EM131144258

Lab Assignment: Advanced Encryption Standard (AES)

This exercise uses theAdvanced Encryption Standard (AES). The United States National Institute of Standards and Technology (NIST) adopted AES as Federal Information Processing Standards Publications 197(FIPS PUB 197) in 2001. AES supports key lengths of 128, 192, and 256 bits; JavaScrypt uses 256 bit keys exclusively.

For this exercise, you will need to use two different e-mail accounts (i.e., your Strayer email account and your personal email account). You will be creating an encrypted message and sending it from your first e-mail account to your second e-mail account.

Instructions

• Capture a screenshot as you complete each one of the lab steps and paste it in the designated spot below each step.

If there is a question in a step, your response should be included directly under the screenshot of that step.

Lab Steps:

1. Go to the JavaScrypt Encryption and Decryption page, located at https://www.fourmilab.ch/javascrypt/javascrypt.html

<paste screenshot here>

2. Create a key and enter it into the text box under the "Key" section. (The text option button under the textbox should be selected.) Next, click the "Generate" command button. Copy the contents of the "Key" text box to a notepad file because you will need it later.

<paste screenshot here>

3. Then, go to the "Plain Text"" box immediately underneath the "Key" text box and enter text that you want to encrypt. (The "Codegroup" option button under the textbox should be selected.) Click the "Encrypt" command button.

<paste screenshot here>

4. Look at the "Cipher Text" text box located below the "Encrypt" command button. Explain what is there.

<paste screenshot here>

5. Login to your second e-mail account and open a new email.

<paste screenshot here>

6. Copy the contents of the "Cipher Text" text box into the body of the email that you will be sending to your second email account.

<paste screenshot here>

7. Clear the contents of each of the "Key," "Plain Text," and "Cipher Text" text boxes.

<paste screenshot here>

8. Send the email from your first email account to your second email account.

<paste screenshot here>

9. Go to your second email account and open the email that you sent to yourself. Copy the encrypted message and paste it into the "Cipher Text" text box at https://www.fourmilab.ch/javascrypt/javascrypt.html. Click the "Decrypt" command button.

<paste screenshot here>

10. Look back in the "Plain Text" text box. What do you see? Discuss what happened.

<paste screenshot here>

11. Now, enter the key (plain or encrypted) into the "Key" text box. Which key did you enter? Can you enter the plain (unencrypted) key or do you have to use the encrypted one in order for the contents of the encrypted "Cipher Text" text box to be unencrypted and displayed in the "Plain Text" text box? Provide a rationale for your response.

<paste screenshot here>

12. If a person does not have the original encrypted key, can he or she encrypt the original key that he or she entered in the "Key" text box? Provide a rationale for your response.Note: No screenshot is needed for this step.

13. Explain the differences, if any, between using AES encryption versus a DES one. Note: No screenshot is needed for this step.

14. Why do many consider AES encryption more secure than DES? Provide a rationale for your response. Note: No screenshot is needed for this step.

Reference no: EM131144258

Questions Cloud

Calculate both cp and cpk : Using an USL of 40 and an LSL of 20, calculate both Cp and Cpk where Cp = (USL-LSL)/6*σ and Cpk = Minimum of (USL-μ)/3σ and (μ-LSL)/3σ.
How byod either positively affect an organizations security : Provide a real-world example of how BYOD either positively or negatively affected an organization's productivity and / or security.
What is meant by pareto efficiency : What is meant by Pareto efficiency? What is required for the economy to be Pareto efficient? If the conditions of the basic competitive model are satisfied, is the economy Pareto efficient?
Develop a materials requirement plan : Develop a materials requirement plan (MRP) for component parts K and W over the next eight weeks. - calculate the labor-hours needed in each of the two work centers in each week.
Can you enter plain key or do you have to use the encrypted : Can you enter the plain (unencrypted) key or do you have to use the encrypted one in order for the contents of the encrypted "Cipher Text" text box to be unencrypted and displayed in the "Plain Text" text box?
Do highways provide an example of a public good : Can you describe a situation in which the marginal 258∂ CHAPTER 11 INTRODUCTION TO IMPERFECT MARKETS costs of an additional driver on the highway might be high? How might society deal with this problem?
Presented below are data on three promissory notes : Presented below are data on three promissory notes. Determine the missing amounts.
Compute interest and find the maturity : Compute interest and find the maturity date for the following notes.
Jamar company sold its accounts receivable : Jamar Company sold its accounts receivable of $60,000.What entry should Jamar make, given a service charge of 3% on the amount of receivables sold?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine the level of necessary controls to mitigate risks

Describe how an organization determines the level of necessary controls to mitigate the risks while considering the value of its assets.

  What is the main difference between a virus and a trojan

What is the main difference between a virus and a Trojan? A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Information on the current security state

You selected an organisation, and provided information on the current security state and made suggestions of improvements to their security

  Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, Warehouse, and Data Mining. · Networks, Collaboration, and Sustainab..

  Compare symmetric encryption to asymmetric encryption

Compare and contrast symmetric encryption to asymmetric encryption. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Sony reels from multiple hacker attacks

Sony Reels from Multiple Hacker Attacks on page 252 in the text and answer the questions below. APA formatting guidelines require a title page, abstract page, and reference page in addition to the body of the paper.

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks

  Explain the functionality of a firewall and give an example

Explain the functionality of a firewall and give an example of a firewall. 200 word response. Describe a Network Address Translation (NAT). Provide an example of NAT.200 word response.

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Establish a secure communication channel

Understand some basic techniques for building a secure channel - Understand network programming and Write UDP programs allowing two parties to establish a secure communication channel.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd