IS Lab 04
IS Lab 04
SUBMITTED BY SUBMITTED TO
Name: Mahaz Abbasi Name: Mam Zainab Iftekhar
Reg no.: F23605035 CS Department (A)
Part 1: Verify OpenSSL Installation
Solution:
Ubuntu, being a Linux-based operating system, often comes with OpenSSL pre-installed. To check if
OpenSSL is already installed, you can run the following command in your terminal:”openssl version”
3.The enc command in OpenSSL is used for encryption and decryption. It supports a variety of
symmetric encryption algorithms, including AES, DES, and more.
4.The command openssl enc -ciphers is used to display a list of the cipher algorithms that are
available for use with the OpenSSL encryption command (enc). This includes symmetric encryption
algorithms like AES, DES, and others.
Asymmetric key generation using RSA (Rivest-Shamir-Adleman) is a widely used method for
generating a pair of cryptographic keys: a public key and a private key. These keys are used for
secure data transmission and digital signatures.
Key Concepts
Public Key: This key is shared with everyone. It can be used to encrypt data or verify a digital
signature.
Private Key: This key is kept secret and is used to decrypt data or create a digital signature. It must be
protected at all costs.
Encrypting and decrypting data using RSA involves using a pair of keys (public and private)
generated by the RSA algorithm. RSA is widely used for secure data transmission, especially in
scenarios where a shared secret key cannot be used securely.
Key Concepts
Encryption Process
1. Generate RSA Key Pair: You first need a pair of keys (public and private). This can be done
using OpenSSL as previously described.
2. Encrypt Data: Use the public key to encrypt the plaintext data.E.g: I want to hake whole
system of israel
Decryption Process
1. Decrypt Data: Use the private key to decrypt the ciphertext back to plaintext.