logo

SSH Public Key, LANMAN Hash, SSH Private Keys, SHA-512 Hash

   

Added on  2023-01-18

8 Pages1588 Words64 Views
 | 
 | 
 | 
Running head: DIGITAL FORENSIC
DIGITAL FORENSIC
Name of the student
Name of the university
Author Note
SSH Public Key, LANMAN Hash, SSH Private Keys, SHA-512 Hash_1

1DIGITAL FORENSIC
SSH public key
SSH helps in supporting authentication methods. There are major steps that help in
setting up public key authentication for SSH. This includes creation of key pair that is done with
SSH-keygen. In public key SSH the user shares public key to receivers. The receiver uses these
public key for decrypting the data. These data are further being used for personal use. However
these data are not secured and can be accessed by anyone having the public key. Thus it becomes
very difficult to ensure security towards the data stored. This is being done with the help of ssh-
copy-id utility. After this server is used for storing the public key and server will allow users
with private key to access the data. SSH is basically a cryptographic network protocol that helps
in performing proper network services over unsecured network (Cao et al. 2019). The different
types of keygen commands are -b bits, -C comment, -p, -t, -o, -q, -N, -F. The steps associated
with creation of SSH public key includes:
Step 1: creation of RSA key pair
This step includes creating key pair on client machine:
$ ssh-keygen –t rsa
Step2: storing the keys and passphrase
After the gen key command is entered there are some questions related to file:
Enter file in which to save the key (/home/demo/.ssh/id_rsa)
Step 3: this step includes copying public key
$ ssh-copy-id < >
SSH Public Key, LANMAN Hash, SSH Private Keys, SHA-512 Hash_2

2DIGITAL FORENSIC
The syntax of SSH public key is as follows:
ssh-keygen [options]
LANMAN hash
LANMAN Hash is also known as LM hash or LAN Manager Hash. This mainly
comprises passwords along with hashing function. These stores the user passwords set by users.
This is basically used for encryption mechanism that was implemented by Microsoft. Once the
end users enters there passwords, the hash function converts the characters into different
uppercase. If the password is less than 14 characters then the password gets null padded to 14
bytes. After this the hash function is used for splitting the 14 characters into halves. This is
further used for Data Encryption Standard (DES) as two separate keys (Fiterau-Brostean et al.
2017). This ensures developing effective creation of two 7-byte hashes. The regular expression
used by LANMAN Hash is as follows:
LMhash=DESeach(DOSCHARSET(UPPERCASE(password)), "KGS!@#$%")
The algorithm that is being used for LANMAN hash are described below:
First step: Converting all the lower case to upper case
Second step: the data are further being converted to 14 characters with NULL characters by Pad
password
Third step: after this the password is being divided into two 7 character chunks
Fourth step: Creating two DES keys from different 7 character chunks
SSH Public Key, LANMAN Hash, SSH Private Keys, SHA-512 Hash_3

End of preview

Want to access all the pages? Upload your documents or become a member.