Task 1 Verification of the Debian DVD ISO image Fortheverification,theentirefileshavebeendownloadedfromthewebsite: https://goo.gl/8CNeyc. In order to check the completeness of the ISO images including its signature files for SHA-1, the following steps are done. In the first step, entire files are documented in the directory so that every file should be at the proper place Now go for the check for correct signature with the help of GNU Privacy Guard. This check is for SHA-1. As the command will run for the first time, there is no availability of the public key on the system. This command will let the result as ID= ‘6294BE9B’. This ID will help in retrieving the public key as explained in the step below. Now, from the Debian key server, download the public key by using the ID ‘6294BE9B’ 2
In this step, the verification is done on both the checksum files by comparing the signature files In order to confirm the authenticity of the image of Debian DVD, a statement is appeared as “Good signature from "Debian CD signing key <debian-cd@lists.debian.org>”. For the comparison of the listed key in the link:https://www.debian.org/CD/verify, the generated fingerprint key is used and the key is DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B which matches to the listed fingerprint keys. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Atlast, the content of the ISO image is verified. After this, there will be verification of the checksum of the ISO images and their matching with the expected checksum file. 4
Task 2 Step 1: Firstly show the global variables in the two forms of encoded and text format Step 2: Prepare to extract the Public or private key from the given variables 5
Step 3: In this step, the public key is extracted 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Task 4 Abstract Technology becomes advanced to a higher level where different aspects of the data and the network are considered. One such aspect is the security of the data which is being transferred from the sender to the receiver from any points of the world. Some of the data is confidential whichmustbesecuredfromallthethreatsandforthis,thereareseveraltypesof mechanismsavailable for the security. One such method is cryptography and with this data can be converted into another form which can be understood by only the sender and receiver. This is done using some block cipher algorithms and the main algorithms which are used most popularly are DES and AES (Rock and Nyberg, 2013). Introduction Most popularly used algorithms of symmetric key block cipher are AES and DES. These algorithms are widely used to encrypt and decrypt the data which is being transferred on a non- secured network channel. This report includes a brief discussion on both these algorithms. DES (Data Encryption Standard) and its operation Data Encryption Standard is a type of algorithm which protects the data available in electronic format. The data is firstly converted into the gibberish language known as ciphertext and during decrypting the cipher text is converted into the original data. It takes an input data of 64 bits and having output data of similar size. There are four types of round that are followed during each round of conversion and they are a permutation, shifting, substitution box and instantiations (Simmons, 2016). Figure1: DES Source: Strengths of DES Secret key of 64 bits is converted into the output of the same size In case, if the key is expanded to a larger size then the extra can be used in the later operations 10
This algorithm is difficult to break Difficult to crack the codes Weakness of DES Keys used are less scalable to the software implementation Security aspects are limited toa change in security protocols(Oukili and Bri, 2017). Application of DES and its future possibilities Financial transactions Increases speed of the ATM’s functioning Mostly used in routers and servers DES is used in most of the sectors and provided high specific security to the data during its transfer. It allows the high encryption level as there isthe availability of higher versions of DES in the security field such 3-DES. However, computing resources such as bandwidth and memory are limited in case of DES (Khiabani, Wei, Yuan and Wang, 2012). AES (Advanced Encryption Standard) and its operation AES is another form of cipher encryption and decryption standard in terms of symmetric keys. In this blocks of plaintext are converted into the cipher coding and this can be done by using keys of sizes 128 bits, 192 bits and 256 bits. There are specific rounds decided by the size of keys such as there are 10 rounds for the 128 bit and so on. in each round, there are four types of transformation that take place during one round and they are sub-bytes, rows shifting, column mixing and add round key(Kumar and Farik, 2017). Strengths of AES Easy implementation of the domain hardware Size of the keys are available in a wider range Breaking of the algorithm applied to the data is difficult High range of applications Weakness of AES Easily understandable design of the algorithm Implementation of this algorithm on software is hard Similar algorithms are used in all blocks which leads to more risk (De and Bhaumik, 2014) Application of AES and its future possibilities In almost all data transactions E-commerce Electronic banking Confidential email transfer 11
There are various future developments in the field of AES algorithm and is the optimum choice for different security services and its implementation in various numerous applications. There are huge aspects of research, developments, deployments and their analysis for better performance and efficiency (Hsiao and Liou, 2014). Conclusion and recommendation In this report, research has been done in the field of the typecipher algorithms and they are AES and DES. Here strengths and weakness of the standards have been discussed in addition to their working and applications. Both these type of algorithms are good forthe encryptions and decryption of the data. After the analysis, it was found that AES provides better encryption and decryption as it provides better security to the data. AES also provides a wider range of key sizes which increase its durability with the changing demand for security. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References Oukili, S. &Bri, S. 2017, "High throughput FPGA implementation of Advanced Encryption Standard algorithm", TELKOMNIKA, vol. 15, no. 1, pp. 494 Kumar, J. &Farik, M. 2017, "Cracking Advanced Encryption Standard-A Review", International Journal of Scientific & Technology Research, vol. 6, no. 7, pp. 101-105 Rock, A. & Nyberg, K. 2013, "Generalization of Matsui's Algorithm 1 to linear hull for key- alternating block ciphers", Designs, Codes and Cryptography, vol. 66, no. 1-3, pp. 175. Simmons, G.J. 2016, Data Encryption Standard (DES), Encyclopædia Britannica Inc. Khiabani, Y.S., Wei, S., Yuan, J. & Wang, J. 2012, "Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise", IEEE Transactions on Information Forensics and Security, vol. 7, no. 5, pp. 1604-1613. De, S. &Bhaumik, J. 2014, "TBLT-AES: A Robust Image Encryption Scheme", Journal of Discrete Mathematical Sciences and Cryptography, vol. 17, no. 3, pp. 273-288. Hsiao,F.&Liou,G.2014,"ApplicationofAdvancedEncryptionStandardtoChaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary", IEEE, , pp. 1. 13