Make a screen capture showing the fingerprint generated

Assignment Help Web Project
Reference no: EM131347023

Assignment

Make a screen capture showing the fingerprint generated by the key creation process and paste it into your Lab Report file.

Introduction

As computers, tablets, phones and other "always on" digital devices become increasingly interconnected through unsecure public networks, threats against our privacy and digital security increase in kind. Threats like identity theft and credit fraud threaten our financial security. Digital stalking and online harassment threaten our physical and emotional security. Some suggest that digital surveillance, mass data collection, and data mining by government and commercial entities encroach on our right to free speech, our freedom of association, and our Constitutional protections against unlawful search and seizure.

The need to protect confidential and private information over "public" networks is an ancient one. The solution then, as now, is to encode private data using cryptography. Simply put, cryptography takes human readable information and makes it unreadable "cipher text" which can only be read if one possesses the correct key. Generally speaking there are three cryptographic standards: symmetric cryptography, asymmetric cryptography, and hybrid cryptography.

With symmetric cryptography the sender and receiver use the same key (or "shared secret") to encrypt and decrypt a given message. Symmetric cryptography is quite fast and generally easier to implement than asymmetric cryptography. However, while symmetric cryptography does provide confidentiality and integrity, it does not guarantee authenticity. In other words, you do not know for certain who gave you the encrypted message.

With asymmetrical encryption, the sender has two keys: a private key and a public key. The sender encrypts with her private key and the receiver decrypts using the sender's public key, which the receiver obtains from the sender or through a trusted third party, such as a certificate server. While asymmetrical encryption is slower and more complex than symmetrical encryption, it does guarantee the authenticity of the sender.

The hybrid approach is to have the sender encrypt the message with a symmetric key, and then send the message and a copy of the symmetric key using the sender's asymmetric public key. The initial message and symmetric key are decrypted using the sender's public key, and subsequent messages are then decrypted quickly using the symmetric key. The hybrid approach provides the same full CIA protection as asymmetrical encryption with nearly the same speed as symmetrical encryption.

In this lab, you will learn how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You will use Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You will use the sender's keys to encrypt a file, send it to the receiver, and decrypt it using the receiver's copy of the keys.

This lab has five parts which should be completed in the order specified.

In the first part of the lab, you will create a public and private key pair for the senders account on the vWorkstation desktop.

In the second part of the lab, you create a public and private key pair for the receiver's account on the remote desktop, TargetWindows01.
In the third part of the lab, you will transfer and import the public key from the receiver, TargetWindows01.

In the fourth part of the lab, you will encrypt a file on the vWorkstation desktop using the receiver's public key and the sender's private key, send it to the remote machine, and then decrypt the file.

Finally, if assigned by your instructor, you will explore the virtual environment on your own in the third part of the lab to answer a set of challenge questions that allow you to use the skills you learned in the lab to conduct independent, unguided work, similar to what you will encounter in a real-world situation.

Learning Objectives

Upon completing this lab, you will be able to:

Apply the concepts of common cryptographic and encryption techniques to ensure confidentiality

Understand public and private key pairs and basic asymmetric cryptography

Generate a public and private key pair

Encrypt a data message using a public and private key pair

Decrypt a data message using a public and private key pair

Tools and Software

The following software and/or utilities are required to complete this lab. Students are encouraged to explore the Internet to learn more about the products and tools used in this lab.

FileZilla

GPG4Win (Kleopatra).

Reference no: EM131347023

Questions Cloud

Determine the minimum throat diameter : Determine the minimum throat diameter required for a nozzle to pass 0.250 lbm/s of air from a stagnation state of 100. psia at 70.0°F.
Is the monopoly on patented pharmaceuticals warranted : Is the monopoly on patented pharmaceuticals warranted? What barrier to entry prevents the re-importation into the United States of pharmaceuticals sold at lower prices abroad (say, in Canada)?
Determine the diameter of the leak hole : Air leaks into the chamber from the atmosphere at 101.3 kPa, 20.0°C, and the air inside the chamber is maintained at 20.0°C by heat transfer with the walls. Determine the diameter of the leak hole.
How long will it take to fill the tank : The tank is connected to the source by a single 0.125-inch inside diameter tube. How long will it take to fill the tank?
Make a screen capture showing the fingerprint generated : Make a screen capture showing the fingerprint generated by the key creation process and paste it into your Lab Report file. This lab has five parts which should be completed in the order specified.
Discuss how affordable care act impacts the quality of care : Discuss how Affordable Care Act impacts the "quality of care" in nursing profession and NPs in our healthcare delivery system. "How will the ACA help control and improve the quality of care?" (Nickitas, Middaugh & Aries, 2016, p. 82)
Show that the absolute maximum thrust produced as given : Use the linear momentum rate balance (LMRB) to show that the thrust force F of a rocket engine nozzle (given Figure) is given by:
What dollar level of profits will be earned : The commission has ordered the firm to charge a price that will provide the firm with no more than a 10 percent return on its assets. What price should the firm charge, what output will be produced, and what dollar level of profits will be earned?
Discuss the difference between non-parametric-parametric : Discuss the differences between non-parametric and parametric tests. Provide an example of each and discuss when it is appropriate to use the test. Next, discuss the assumptions that must be met by the investigator to run the test.

Reviews

Write a Review

Web Project Questions & Answers

  Create a web site to provide information about modern design

Create a Web site to provide information about Modern Design for customers shopping for modern furniture, contemporary accessories, and interior design services.

  How to select financial institutions how to manage money

The focus of this unit is on personal financial decision-making. As consumers, individuals are faced with a vast array of personal economic decisions including how to select financial institutions, how to manage money, credit, choosing a career, and ..

  Microsoft word to format a paper according to apa

Review the following tutorials which demonstrate the use of Microsoft Word to format a paper according to APA Sixth Edition standards. Title Page , Abstract , Introduction & Thesis Statement , Body Of The Paper , Block Quote , Conclusion

  Mention why is the mouse cursor slightly tilted

Mention why is the mouse cursor slightly tilted and not straight?

  Create a web page that prompts the user for information

Prepare all questions from the array on the page as a trivia quiz and prepare the deleted question stored in the variable as the bonus question.

  What would like to web page to do

What would like to web page to do? Who is my audience and What do I want it to look like? How simple do I want it? How complex?

  Art gallery

Choose one of the following topics for your Project. Make sure to complete all requirements listed. You may need to do research outside the textbook to learn how to do something new or to compile the data needed for the Project. Do not do just the..

  Describe specific design criteria that evaluate any website

Create a table or form describing 10 specific design criteria that can be used to evaluate any website. This table or form will be used in Week 3 to evaluate multiple websites.

  Design a site that explains implementation plan

Design an application or site that presents and explains your Implementation Plan. The site must include all sections of the plan and related content and consist of multiple web pages. Ensure there is an index or some type of introductory text doc..

  List and describe two key gui design characteristics

List and describe two key GUI design characteristics that you feel should be incorporated into a GUI program. Explain why these design characteristics will make your program more user-friendly

  Explain the different types of interactive environments

Describe the differences in developing user interfaces for different application environments. Compare and contrast the different types of interactive environments.

  Prepare a web project and host it online

You will finalize your course project and host it online. To finalize your project, complete the following tasks: Insert keywords, a title, and description to make each page ready to upload. Add a disclaimer to the bottom of each page stating that th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd