logo

Cryptography and Security - Assignment 2: Verification, Validation, and Encryption Algorithms

   

Added on  2024-05-29

11 Pages1366 Words462 Views
 | 
 | 
 | 
CSC8419
Cryptography and Security
Assignment 2
Cryptography and Security - Assignment 2: Verification, Validation, and Encryption Algorithms_1

TASK 1
In this Task, verification and validation would be done on Debian DVD (Digital video disc) ISO
image. All the necessary files are downloaded from link https://goo.gl/8CNeyc and ISO
(International organization for standard) image along with the signature files of MD5 are ready
for the purpose of completeness.
Firstly there is a listing of each and every file present in the directory to ensure that
everything is present in its designated place.
Secondly, proper checking is done for the precise and accurate signature with the help of free
GNU privacy guard (gpg) which is done for MD5. Therefore,
While the command is run for the very first time then the public key might not be present in
the system which we got from ‘6294BE9B’ ID. This command from which public keys can
be retrieved are as follows:
Thirdly the public key is been downloaded with the help of ID ‘6294BE9B’the Debian server
keyring:
Cryptography and Security - Assignment 2: Verification, Validation, and Encryption Algorithms_2

Here the signature of together checksum files is been verified.
The line- “Good signature from "Debian CD signing key <debian–cd@lists.debian.org”
authorizes the validation of Debian DVD image. The generated key fingerprint which is
DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B can be used and then compare
it to the one’s listed in this link- https://www.debian.org/CD/verify. This comparison presents
with the key fingerprint matches.
Cryptography and Security - Assignment 2: Verification, Validation, and Encryption Algorithms_3

At last the ISO image content can be verified to validate the checksum matches of ISO image
with the one anticipated from the checksum file.
Cryptography and Security - Assignment 2: Verification, Validation, and Encryption Algorithms_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents