0% found this document useful (0 votes)
228 views13 pages

Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure

Computer Science related assignment "Public key Infrastructure"

Uploaded by

ZaryabRid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
228 views13 pages

Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure

Computer Science related assignment "Public key Infrastructure"

Uploaded by

ZaryabRid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Lab Assignment 7: Encrypting and Decrypting Files with Public Key

Infrastructure

Glenroy Baptiste

Internet/Intranet Security COM-460-

0L01
Section 1: Hands-On Demonstration: Part 1: Create Encryption Keys
Step 11: Make a screen capture showing Nancy’s public key

Glenroy Baptiste

Step 21: Make a screen capture showing Matthew’s public key


Glenroy Baptiste

Section 1: Hands-On Demonstration: Part 2: Encrypt a File


Step 12: Make a screen capture showing the output of the --list-keys command
Glenroy Baptiste
Step 18: Make a screen capture showing the encrypted message

Glenroy Baptiste
Section 1: Hands-On Demonstration: Part 3: Decrypt a File
Step 3: Make a screen capture showing the decrypted message

Glenroy Baptiste

Section 2: Applied Learning: Part 1: Encrypt a File with Symmetric Encryption


Step 10: In the Lab Report file, document the password you used to encrypt the file.
Passw0rd!

Step 14: Make a screen capture showing the output of the ls command
Glenroy Baptiste
Glenroy Baptiste

Step 25: Make a screen capture showing the contents of the decrypted file
Glenroy Baptiste

Section 2: Applied Learning: Part 2: Encrypt a File with Asymmetric Encryption


Step 7: Make a screen capture showing the instructor’s key pair files

Glenroy Baptiste
Step 20: Make a screen capture showing the encrypted contents of the

S2_yourname_newfile_ENCRYPTED.txt file

Glenroy Baptiste

Step 30: Make a screen capture showing the decrypted contents of the

S2_yourname_newfile_DECRYPTED.txt file
Glenroy Baptiste

Section 3: Challenge and Analysis

You are conducting a security investigation of malicious activity that took place on the
TargetLinux01 workstation. As part of your investigation, you would like to send a log file
from the system to your instructor to get advice on interpreting login attempts. The
authentication log is stored in the /var/log/auth.log file.

Log into the TargetLinux01 system using the student account, obtain a copy of the file, and
encrypt it using AES encryption so that only Matthew Hunter can read the file.
Make a screen capture showing the commands used to encrypt and copy the file.

• Create both keys for each user


• Transfer student key to instructor
• Copy file from student terminal
• Encrypt file from student terminal
• Add permission to file from student terminal

• Copy file to instructor terminal


• Decrypt file on instructor terminal
Glenroy Baptiste

Next, copy the file to the instructor account and decrypt it there.

Make a screen capture showing the commands used to copy and decrypt the file.
I’ve encrypt the file, I can see the encrypted file in the /tmp, however I am unable to execute
successful decryption. I am receiving errors which I have not been able to figure out.

Glenroy Baptiste

You might also like