TASK 1 In this Task, verification and validation would be done on Debian DVD (Digital video disc) ISO image.Allthenecessaryfilesaredownloadedfromlinkhttps://goo.gl/8CNeycandISO (International organization for standard) image along with the signature files of MD5 are ready for the purpose of completeness. Firstly there is a listing of each and every file present in the directory to ensure that everything is present in its designated place. Secondly, proper checking is done for the precise and accurate signature with the help of free GNU privacy guard (gpg) which is done for MD5. Therefore, While the command is run for the very first time then the public key might not be present in the system which we got from ‘6294BE9B’ ID. This command from which public keys can be retrieved are as follows: Thirdly the public key is been downloaded with the help of ID ‘6294BE9B’the Debian server keyring:
Here the signature of together checksum files is been verified. The line- “Good signature from "Debian CD signing key <debian–cd@lists.debian.org” authorizes the validation of Debian DVD image. The generated key fingerprint which is DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B can be used and then compare it to the one’s listed in this link- https://www.debian.org/CD/verify. This comparison presents with the key fingerprint matches.
At last the ISO image content can be verified to validate the checksum matches of ISO image with the one anticipated from the checksum file.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
TASK 2 1.It is started by representing the global public parameters both in the format of text and encoded. 2.It is required now to generate the private/ public key with the help of public parameters.
3.Further, it is required to abstract out the public key.
4.Now, it is set to produce the shared secret key which is been done by utilizing the public key and private key of the mentor.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
5.Both of the shared key been produced here at the side of the instructor should be similar for the accurate shared generation of the secret key.
TASK 4 AES (Advanced Encryption Standard) and DES (Data Encryption Standard) Abstract Both DES and AES are known as a symmetric block cipher and in this AES was announced to overcome with all the drawbacks of DES. Since DES has a smaller key size which allows less security to overcome such introduced triple DES but rather it turned to be slower. Later, Advanced encryption standard was been introduced and the basic difference among AES and DES is that in AES the complete block is processed to attain the ciphertext whereas in DES the plaintext block is segregated to two halves prior to the starting of the main algorithm. Introduction Here, proper explanation will be done of DES and AES along with each one of its advantages and disadvantages. The main problem lies in choosing whether network data needs to be encrypted with DES encryption algorithm or AES encryption algorithm because it is now a major security matter. DES DES is known as (shared secret key) symmetric block cipher having a 56 bits key-length. Originally the federal government developed DES encryption in order to proffer government communications with cryptographic security. To present the inadequacy of DES and also it should not be utilized in importance system; many challenges were funded to watch how much time it would be taking the message to decrypt. The principle of DES work is Feistel cipher structure and plaintext has 64 bits. In comparison to AES, DES has comparatively smaller key size. It is comparatively slower and contains a smaller key which tends to be less secure (Simmons, 2016). Advantages of DES It is encountered while interfacing with the legacy services and commercial products. It is the predecessor which encrypts using 56-bit key having 64-bit blocks. It can extend its key length by applying 3 DES operations which goes with 0 key encryption, key 1 decryption and key 2 encryption (Qin, Deng, Liu & Ma, 2015). Disadvantages of DES Each block is been encrypted to the isolation which is creating a security vulnerability. The three keys may be related. Its key length is 56 bits only.
Block size is 64 bits (Li, Zhang, Chen & Xiang, 2018). AES AES is also known as symmetric key block cipher which was published in 2001 by the National Institute of standards and technology. Further, it was been introduced in order to replace DES to a use-up algorithm which was quite slower and very small cipher key. It has 128-bit secret key and 128-bit plaintext to form together a 128-bit block depicted as 4*4 square matrix which undergoes an initial transformation (Kumar & Farik, 2017). Advantages of AES It is more mathematically elegant and efficient cryptographic algorithm. It allows users to choose among 256-bit key, 192-bit or 128-bit key. It is secure It is considered with modern standard and successor. Decryption and encryption are done from the particular key in AES (Wadi & Zainal, 2013). Disadvantages of AES It uses very simple algebraic structure. It is tough to execute with software. Each block is been encrypted in the similar way (Li & Liu, 2013). Recommendation AES is the replacement of DES since standard symmetric algorithm encryption for the US federal organization. AES uses 128-bit blocks and accepts any of 256, 192 or 128 bits and also is effective in both of the hardware and software. Also, it was been chosen via an open competition including many cryptographers. Basically, AES is the best amongst both. Conclusion DES is known as the older algorithm and also AES is called as the advanced algorithm. Thus, it tends to be faster and secure compared to DES. AES is unbreakable and uses substitution- permutation whereas DES is breakable and uses balanced Feistel structure. In all, AES gets to be the better among two.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References Kumar,J.&Farik,M.2017,"CrackingAdvancedEncryptionStandard-AReview", International Journal of Scientific & Technology Research, vol. 6, no. 7, pp. 101-105. Li, J. & Liu, H. 2013, "Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map", IET Information Security, vol. 7, no. 4, pp. 265-270. Li, J., Zhang, Y., Chen, X. & Xiang, Y. 2018, "Secure attribute-based data sharing for resource-limited users in cloud computing", Computers & Security, vol. 72, pp. 1. Qin, B., Deng, R.H., Liu, S. & Ma, S. 2015, "Attribute-Based Encryption With Efficient VerifiableOutsourcedDecryption",IEEETransactionsonInformationForensicsand Security, vol. 10, no. 7, pp. 1384-1393. Simmons, G.J. 2016, Data Encryption Standard (DES), Encyclopædia Britannica Inc. WADI, S.M. & ZAINAL, N. 2013, "A LOW COST IMPLEMENTATION OF MODIFIED ADVANCEDENCRYPTIONSTANDARDALGORITHMUSING8085A MICROPROCESSOR", Journal of Engineering Science and Technology, vol. 8, no. 4, pp. 406-415.