0% found this document useful (0 votes)
8 views1 page

Lab2 Crypto

The document provides instructions for a cryptography lab involving hash functions, symmetric encryption using Caesar cipher and 3DES, and asymmetric encryption using RSA. Students are asked to hash files with different contents, encrypt and decrypt files using symmetric keys, and digitally sign documents using RSA.

Uploaded by

Sana Sammari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Lab2 Crypto

The document provides instructions for a cryptography lab involving hash functions, symmetric encryption using Caesar cipher and 3DES, and asymmetric encryption using RSA. Students are asked to hash files with different contents, encrypt and decrypt files using symmetric keys, and digitally sign documents using RSA.

Uploaded by

Sana Sammari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Lab 2

Cryptography

To be able to complete the remaining parts of the lab, make sure that the software “Cryptool
1.4.21” is installed on your machine.

Part 1 :Hash function

1- Create a file containing “Make a transfer of 100 dollars from my account”, save it on the
desktop then open it in Cryptool.
2- Compute the hash of your file using SHA1 algorithm (you can find it in Indiv. Procedures)
3- Save the computed hash value.
4- Modify the amount defined in the file from 100 to 1000. Compute again the hash value.
5- Compare the two obtained values what can you notice.
6- Which properties of the hash functions have you been able to test?

Part 2: Symmetric encryption

I- Classic cryptosystem
1- Use the Caesar function with key=5 to encrypt and then to decrypt the original file.
2- Has the amount value been encrypted? What should you do to ensure its encryption?

II- Modern Cyptosystem


1- Use 3DES to encrypt the original file. For this purpose, enter the symmetric key that would
be used. Make a copy of your key. Save the ciphered file.
2- Decrypt the ciphered file to retrieve the original one. Which key have you used?
3- Send the crypted file to your classmate. What he needs to decrypt it?
4- Send him the required credentials. Is he able to read the message? Ask him to answer you
with a message crypted with the same key.

Part 3: Asymmetric encryption

I- Repeat the the previous steps 1-4 using an RSA algorithm.


II- Use the Signature demonstration defined under “digial/signature PKI” to :
a. Select the document that you want to sign (you can use the initial document in this
lab).
b. Select and compute the hash function of the document.
c. Generate RSA public keys.
d. Generate the certificate related to the generated public key.
e. Compute and store the corresponding digital certificate.

You might also like