logo

Cryptography and Security - Assignment 1

   

Added on  2024-05-29

13 Pages1547 Words169 Views
 | 
 | 
 | 
CSC8419
Assignment 1
Cryptography and Security
Student Name:
Student Number:
0
Cryptography and Security - Assignment 1_1

Table of Contents
Task 1..........................................................................................................................................................2
Task 2..........................................................................................................................................................4
Task 4..........................................................................................................................................................8
Introduction.............................................................................................................................................8
Background.............................................................................................................................................8
Conclusion...............................................................................................................................................9
Reference:.................................................................................................................................................10
List of Figure
Figure 1: ISO image file extracted through MD5 Algorithm step 1..............................................................2
Figure 2: ISO image file extracted through MD5 Algorithm step 2..............................................................2
Figure 3: ISO image file extracted through MD5 Algorithm step 3.............................................................2
Figure 4: : ISO image file extracted through MD5 Algorithm step...............................................................3
Figure 5: ID of finger print...........................................................................................................................3
Figure 6: ISO image file extracted through MD5 Algorithm step 5..............................................................3
Figure 7: Secret communication Phase 1.....................................................................................................4
Figure 8: Secret communication Phase 2.....................................................................................................5
Figure 9: Secret communication Phase 3.....................................................................................................6
Figure 10: Secret communication phase 4...................................................................................................6
1
Cryptography and Security - Assignment 1_2

Task 1
Debian DVD ISO image file can be download from the HTTP server such as Debian server. The image
file is downloading from the https://goo.gl/8CNeyc. SHA-1 and the MD5 algorithm can be used for
verification process. I have used MD5 algorithms. This algorithm used encrypted the signature for the
verification. Following steps are used to the creation of ISO image such as
1. It designs the directory files which saved all files single place and confirmation locations of files
are correct.
Figure 1: ISO image file extracted through MD5 Algorithm step 1
2. After that, there is used GNU Privacy Guard for the encrypted signature verification that is
created with the help of an MD5 algorithm.
Figure 2: ISO image file extracted through MD5 Algorithm step 2
In this process, the public key is not created. So there are used gpg commands and extracted
an ID such as ID = ‘6294BE9B’. With the help of ID, gpg commands extracted the public
key.
3. The public key is download form Debian keyring sever with the help of id = ‘6294BE9B’
2
Cryptography and Security - Assignment 1_3

Figure 3: ISO image file extracted through MD5 Algorithm step 3
4. There are performed the verification process MD5 algorithm files.
Figure 4: ISO image file extracted through MD5 Algorithm step
There are created Good signature with the help of Debian CD signing key. There are also created the
fingerprint with the help of DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B key and compared
the SHS-1 fingerprint with the key fingerprint.
Figure 5: ID of fingerprint
5. After that, there is performed ISO image verification process with image content and the testing
process performed through checksum files
3
Cryptography and Security - Assignment 1_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents