logo

Website Authentication: A Comprehensive Analysis of Security Measures

   

Added on  2024-06-04

7 Pages1293 Words317 Views
 | 
 | 
 | 
CRYPTOGRAPHY AND SECURITY -
ASSIGNMENT 2
0
Website Authentication: A Comprehensive Analysis of Security Measures_1

Table of Contents
Task 1:.........................................................................................................................................................2
Task 2..........................................................................................................................................................3
Task 4..........................................................................................................................................................4
Introduction:............................................................................................................................................4
Relevant Section:.....................................................................................................................................4
Conclusion...............................................................................................................................................6
Reference:...................................................................................................................................................6
1
Website Authentication: A Comprehensive Analysis of Security Measures_2

Task 1:
Debian DVD ISO images use the Debian HTTP servers for the encrypted sign file. These file use
MD5, SHA-1, or hash algorithm for the authentication process. Debian HTTP servers are
download from https://goo.gl/8CNeyc. Authenticate process is followed below steps such as
In the first steps, design a directory that contains all files. It ensures that each file is
placed corrected place in the directory.
In the second steps, there is use GNU Privacy Guard ( it is freely available to verify the
signature correct or not. It can be done for both algorithms such as SHA-1 and MD5.
When gpg command run the first time then the system cannot access the public key. But
this execution gives an ID such as ‘6294BE9B’ which help user is able to gain the public
key.
In the third steps, we used gain ID for the public key on the Debian keyring server. It
gives a public key.
In the fourth steps, checksums files (both file such as MD5 and SH-1) signature is
verified.
In the fifth steps, ISO image content is verified so ISO image checksum compares with
other expected checksum file.
2
Website Authentication: A Comprehensive Analysis of Security Measures_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents