Cryptography:: Cryptool
Cryptography:: Cryptool
Cryptography is associated with the process of converting ordinary plain text into
unintelligible text and vice-versa. It is a method of storing and transmitting data in
a particular form so that only those for whom it is intended can read and process it.
Cryptography not only protects data from theft or alteration, but can also be used
for user authentication.
Cryptool:
What is Cryptool?
A freeware program with graphical user interface (GUI).
A tool for applying and analyzing cryptographic algorithms.
With extensive online help, it's understandable without deep crypto
knowledge.
Contains nearly all state-of-the-art crypto algorithms.
“Playful” introduction to modern and classical cryptography.
Not a “hacker" tool.
Lab objectives:
This lab aims to study different types of cryptography (symmetric and asymmetric
cryptography).
1. Symmetric cryptography:
a. Classic cipher (Caesar ):
Introduction:
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of
substitution cipher in which each letter in the plaintext is 'shifted' a certain number
of places down the alphabet. For example, with a shift of 1, A would be replaced
by B, B would become C, and so on. The method is named after Julius Caesar,
who apparently used it to communicate with his generals.
I. CrypTool 2 (CT2) contains various classic ciphers. First, we use the Caesar
cipher, which is one of the easiest substitution ciphers.
Hint 2: copy the text above into the text input component called “Plain text”.
Put the Caesar parameter “Action” to “Encrypt”, and adjust the given key to 13.
In order to start the template, click on the “Play” button.
III. Decrypt the following text using the Caesar cipher
Va pelcgbtencul, n Pnrfne pvcure, nyfb xabja nf Pnrfne'f pvcure, gur fuvsg pvcure
Hint 1: copy the cipher text above into the text input component called “Plaintext”.
Change the Caesar parameter “Action” from “Encrypt” to “Decrypt”, and adjust
the given key to 13. In order to start the template, click on the “Play” button.
b. Modern Cipher (AES):
Introduction:
The Advanced Encryption Standard (AES), also known by its original name
Rijndael is a specification for the encryption of electronic data. It describes a
symmetric-key algorithm using the same key for both encrypting and decrypting.
0D 96 CF F8 7A 16 54 62 61 07 2D F3 E2 60 FD F9 9A 2C 05 FF 44 D5 B3 13
B8 28 C9 66 48 EC C8 85 A4 39 3D 9A D5 47 6D CD B6 45 27 67 03 F4 E2 19
5D 50 2A F1 2E 9A 48 0D 60 BE A3 DA 4D 36 C0 85 3E 21 34 9D 04 7A DA D4
64 86 BA AA 7B 68 BD A2 AA 05 F4 24 3B 48 BF 62 2D C1 63 1F DE 76 22 2F
95 F2 30 48 CE F9 7A 45 6F 99 74 1E B1 5B 1B AB 4C 29 B6 5C BB 38 94 90
92 51 43 40 DF 46 09 52 70 EB 4B 80 F7 6B 61 C3 68 0B E5 A7 9F FF 71 02 6B
DB CD E0 D9 11 D3 E1 56 FE B1 AE E0 57 A1 93 7D 38 7E 6E 4D 1E 4B 92 26
25 E1 6B A9 B1 A1 8F 4B C0 78 2D DC BB 13 84 2A 07 4E F7 DD B3 3A 77 E1
F6 7C A7 9E DA 32 D7 50 51 E4 AE B5 CE C5 67 29 87 31 5C E9 B3 EB 99 80
3C 91 D9 75 30 31 FE 5F CF DC 2D 14 07 6A 1E 33 89 ED D8 D3 3C 98 68
Key: FD E8 F7 A9 B8 6C 3B FF 07 C0 D3 9D 04 60 5E DD
Hint 2: Change the “Message Encoder” input format to “Hexadecimal”, set the
“AES” action to “Decrypt”, and the “Message Decoder” presentation format to
“Text”.
III. Encrypt the following text using the AES cipher built in CT2
AES is a subset of the Rijndael block cipher developed by two Belgian
cryptographers, Vincent Rijmen and Joan Daemen.
Key: FD E8 F7 A9 B8 6C 3B FF 07 C0 D3 9D 04 60 5E DD
Key: FF FF FF FF FF FF FF FF FF FF FF FF FF ?? ?? ??
Hint 2: The cipher used was AES-128. Set the key in the settings of the “Key
Searcher” to FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-FF-**-**-**
One hex character corresponds to 4 bit; a 128 bit key can be described by 32 hex
chars (32*4=128). Here, the last 6 hex chars are asterisks, so 24 bit is unknown.
II. Decrypt the following text using the RSA cipher built in CT2
1D E8 85 3B 7A 8C C2 B9 93 34 32 56 F5 9D 5F B2 A1 92 9B AE B6 AA 16 3A 08 0C E8 4D
48 C4 42 2C EB 51 34 7B 4E C6 01 43 44 17 BD 3E C5 F4 4D 7D A6 1E E1 8B A9 DB 22 77
CF AA 51 14 20 60 40 05 1A 85 4A 56 AE FB C8 2D 13 BD 10 64 8E BC 69 18 F4 60 E3 B3
E1 59 96 DF F6 17 BB E6 24 3A 2E A5 19 E1 E5 16 42 A9 86 0D A8 6B C0 63 34 E8 4A 79
7F 47 18 B7 13 13 BC 2D 04 43 05 37 1F 95 94 B9 85 A5 89 40 5F A4 40 85 1F DA 27 DC 2D
71 72 FF 19 D2 C1 E7 80 27 2D 1C 9F 95 8E 50 F6 68 6A 3A 7B FD 6A 95 E1 DE 9A 87 E1
FE EC 6F 70 27 03 F2 44 34 C5 19 DF BC E2 AD 1D BB F5 56 01 C6 77 8E 66 ED 56 4B 89
68 DD 15 88 08 FC D2 F1 AD 53 93 26 29 9F 8B 4E EF 8D A1 3D 9B 7B 82 35 71 2E C0 01
D0 F0 EE 17 4F CE C5 A7 A6 88 E6 EB 72 42 E8 DA 2A 87 49 2C D8 40 42 7A 10 61 FB D5
67 B8 EF 98 34 66 23 7A A1 57 1D 26 0E 7E DA 07 84 21 3F 9A E6 14 D7 7C A6 6A 0A DB
54 AA 6F A8 12 F7 B1 F2 B8 11 AE 3B 50 6D CA E0 54 DA 04 C8 80 BE 8D 11 73 39 48 24
44 F6 2B 30 B5 FB A6 59 89 2C 05 75 86 92 40 1B C6 BD 22 35 D0 E8 01 3F 59 48 7B 10 F2
B8 24 B7 BF CA 98 B5 55 85 20 EA 11 17 5F 45 59 24 01 2B 9E 96 2D 12 7C DA 18 CF 0C
9C 96 B6 97 48 BE 56 43 12 78 02 7F 28 87 80 F2 D8 15 38 E8 1E 48 B5 3C F7 E5 EE E4 27
A0 5B C5 B1 01 42 08 5E 38 9D B3 51 A5 B7 22 09 A3 A1 DC DA BE 69 18 72 01 9C F6 B6
52 09 9C 90 DC 01 3D 98 12 7F 65 1D 28 D5 D5 AD 7D AE BA 23 6F DE 38 9B 18 CF 03 FB
01 4E 9D EB 14 1E 15 3B E3 A5 AB 7D 2B A0 27 F9 E0 84 DF C0 A4 9C E6 02 32 F5 5C C1
F1 F9 FE DC CF 80 F6 0F E2 94 D0 48 AA E9 A4 74 F7 A6 24 54 18 1F A7 D8 BB 1B BE ED
34 E1 BA D0 90 11 C9 11 35 7B 43 3F 9D FD 17 FE DE 00 C1 31 DE 8A 45 48 92 5B 67 7E
74 08
Hint 1: Open the template “RSA Decryption” in CT2 . You need the parameters
of the private key to do the decryption.
e =7
d = 107908106289784026912038660050179862784614098592125007765603
III. Encrypt the following text using the RSA cipher built in CT2
In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first
publicly described it) is an algorithm for public-key cryptography. It is the first
algorithm known to be suitable for signing as well as encryption, and was one of
the first great advances in public key cryptography. RSA is widely used in
electronic commerce protocols, and is believed to be sufficiently secure given
sufficiently long keys and the use of up-to-date implementations. Source:
http://en.wikipedia.org/wiki/RSA
Hint: Open the template “Dictionary Attack”. Here, enter the different hashes in
the text input component “Test password – Hash-value (HEX)”.
Copy each password hash into the text input, then press to the play button