Task 1 Debian DVD ISO image’s verification process From the linkhttps://goo.gl/8CNeyc, the required data has been downloaded and ISO image has been checked for their completeness by comparing the signatures as follows. List and save all the file in the directory at the correct place For the MD5, correct signature must be verified using the free tool named as GNU Privacy Guard ID= 6294BE9B has been extracted from running the above command where public key is not available. The reason for non-availability is that the command runs for the first time. To retrieve the public keys, following steps are done. Now from the server of Debian Key, the public key can be downloaded using the ID “6294BE9B” 2
For the checksum files, there will be verification of their signatures The confirmation of the authenticity is stated by the appearance of the statement as “Good signature from "Debian CD signing key <debian-cd@lists.debian.org>”. The comparison with the list given inhttps://www.debian.org/CD/verifyis done with the help of generated fingerprint key as DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
In last, there will be verification of the data inside the ISO image and in this, the checksum of the image should matches with the correct signature of the expected checksum file 4
Task 2 Step [1]Encoded and text formats are used for the representation of the given global parameters 5
Step [2]Public parameters are used for the generation of private or public key and there generate them Step [3]Get the private key 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Step [4]All parameters are now set for the generation of the shared secret key. This generation is occurred with the help of instructor’s private and public key 7
Step [5]Finally, the generated shared key should be equivalent and matches the key generated at the side of the instructor and it must be correct secret key 8
Task 3 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Task 4 ‘Using OpenSSL to generate the Digital certificates’ Abstract Digital Certificates are digital form of recognition and identification just like driver license. With the help of digital certificates, it is easy to gather the information regarding the entity whose certificate is this. The verification and validation of the certificates from the trusted authority guarantees the validation of the information supported by the certificates. The owner of the certificate and the private must have to protect the associated private key. Website runs using the internet connection and they are configured with HTTP using the digital certificates. OpenSSL tool helps in developing such certificates for several systems (Zhu and Lin, 2016). Introduction Digital Certificates are important for the identification of any person or business so that they must have identity for identification. Here the research has been done on the digital certificates and how it can be developed using the OpenSSL Tool. Digital certificates Digital certificates are the public key certificates and are actually electronic documents which are used to verify the identity of a person or business in the market. Every certificate is created using specific content and format. The information included in the certificate are regarding the issued person or business, certifying authority, valid date and any restriction on the use (Bort, 2014). OpenSSL OpenSSL is the tool for the Transport Layer Security and Secure Sockets Layer (SSL) Protocols which is highly robust and commercially upgraded. This tool is a licensed under Apache-style License. For simple license condition, it can be used in free for the commercial and non-commercial purpose (Chandrasekar, et-al, 2017). Purpose of Digital Certificates 10
The purpose of the digital certificate includes: Creation of owners identity Makes the availability of the owner’s public key A trusted authority is always involved in the certification of the digital certificates. Every certificate has its limited range of time. Replacement of the digital certificates is required after the expiry of the existing digital certificate. Process of generation For generation of the digital certificates following steps are followed: Step [1]Create certificate signing request or CSR from the certified authority in addition to it entries must be filled Step [2]For the generation of the password, set the commands for password for security Step [3]In order to save the private key, create the key file for storage Step [4]After request command and generation of private key, generate the X.509 digital certificates using the OPENSSL Step [5]Now, generate the certificate for the person in addition to password and the private key using OPENSSL Step [6]Generate the encoded public key which only contains the public key which requires no password Step [7]Verify the certificates from trusted authority using OPENSSL (SAS, 2018) Benefits End users have minimum involvement in the digital certificates There is no requirement of extra hardware No requirement of backup plan Easy accessibility of multiple devices Scalability can be analysed to accommodate the business growth Supported by multiple company’s applications and networks Provides global level security (García, et-al, 2015) Limitations 11
Computational system requires high speed to use digital certificates Fraud issues in certification causes huge losses It protects the only area of company for which it is developed Advanced cyber crime is the issue (Schukat and Cortijo, 2015) Recommendations Digital certificates provided many solutions to the area of authentication to the person or business. It supports public key cryptography because they contain the public key as the main identity in the certificate. It provides a solution in finding the user’s public key and its validation as certificates provides specific public key to the individual and specifically guaranteed by the issuer. Generation of digital certificate with the help of OpenSSL helps in better interaction of the websites and provides easy configuration of the HTTP from web server. Conclusion This report has been developed in context to the development of the digital certificates using the OpenSSL certificate. This report also provides the information related to the basic concept of digital certificate and openSSL. 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References SAS2018,SettingUpDigitalCertificatesUsingOpenSSL,viewed9May,2018, <https://publib.boulder.ibm.com/tividd/td/TRM/GC32-1323-00/en_US/HTML/ admin230.htm>. Zhu, W. & Lin, J. 2016, "Generating Correlated Digital Certificates: Framework and Applications", IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1117-1127. Bort, J. 2014, "Microsoft blacklists all DigiNotar certificates; Microsoft counters active attacks by banning the certificate authority and the fraudulent digital certificates", Women and Language, vol. 37, no. 2. Chandrasekar, B., Ramesh, B., Prabhu, V., Sajeev, S., Mohanty, P. & Shobha, G. 2017, "Development of Intelligent Digital Certificate Fuzzer Tool", ACM, , pp. 126. García, B., Gómez, A., Conde, R., Hernández, Y. & Valero, M.Á. 2015, "Breaking the Web Barriersofthee-AdministrationUsinganAccessibleDigitalCertificateBasedona Cryptographic Token", Advances in Software Engineering, vol. 2015, pp. 1-11. Schukat, M. & Cortijo, P. 2015, "Public key infrastructures and digital certificates for the Internet of things", IEEE, , pp. 1. 13