logo

Cryptography and Security: Assignment 2 - Analysis of DES and AES Algorithms

   

Added on  2024-05-29

14 Pages1535 Words160 Views
 | 
 | 
 | 
CSC8419 - CRYPTOGRAPHY AND SECURITY - ASSIGNMENT 2
Cryptography and Security: Assignment 2 - Analysis of DES and AES Algorithms_1

Table of Contents
Task 1...............................................................................................................................................2
Task 2...............................................................................................................................................5
Task 3...............................................................................................................................................9
Task 4.............................................................................................................................................10
References......................................................................................................................................13
1
Cryptography and Security: Assignment 2 - Analysis of DES and AES Algorithms_2

Task 1
Verification of the Debian DVD ISO image
For the verification, the entire files have been downloaded from the website:
https://goo.gl/8CNeyc . In order to check the completeness of the ISO images including its
signature files for SHA-1, the following steps are done.
In the first step, entire files are documented in the directory so that every file should be at
the proper place
Now go for the check for correct signature with the help of GNU Privacy Guard. This
check is for SHA-1.
As the command will run for the first time, there is no availability of the public key on
the system. This command will let the result as ID= ‘6294BE9B’. This ID will help in
retrieving the public key as explained in the step below.
Now, from the Debian key server, download the public key by using the ID ‘6294BE9B’
2
Cryptography and Security: Assignment 2 - Analysis of DES and AES Algorithms_3

In this step, the verification is done on both the checksum files by comparing the
signature files
In order to confirm the authenticity of the image of Debian DVD, a statement is appeared
as “Good signature from "Debian CD signing key <debian-cd@lists.debian.org>”. For
the comparison of the listed key in the link: https://www.debian.org/CD/verify, the
generated fingerprint key is used and the key is DF9B 9C49 EAA9 2984 3258 9D76
DA87 E80D 6294 BE9B which matches to the listed fingerprint keys.
3
Cryptography and Security: Assignment 2 - Analysis of DES and AES Algorithms_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents