0% found this document useful (0 votes)
18 views6 pages

IS Lab 04

jhj

Uploaded by

mahazabbasif23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

IS Lab 04

jhj

Uploaded by

mahazabbasif23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

National University of Technology

Computer Science Department (A)


Semester Fall – 2024
Lab Report – LAB 3
Course:Information Security

SUBMITTED BY SUBMITTED TO
Name: Mahaz Abbasi Name: Mam Zainab Iftekhar
Reg no.: F23605035 CS Department (A)
Part 1: Verify OpenSSL Installation
Solution:
Ubuntu, being a Linux-based operating system, often comes with OpenSSL pre-installed. To check if
OpenSSL is already installed, you can run the following command in your terminal:”openssl version”

Part 2: Introduction to OpenSSL Command-Line Tools


Solution:
1. To see a comprehensive list of OpenSSL commands, you can use the openssl help command.
This will provide a summary of available command-line options and the different cryptographic
tools OpenSSL offers.
2. The man openssl command displays the manual page for OpenSSL, which contains detailed
documentation about its usage. To see the OpenSSL manual on your system, simply type the
following in the terminal:’’man openssl”

3.The enc command in OpenSSL is used for encryption and decryption. It supports a variety of
symmetric encryption algorithms, including AES, DES, and more.
4.The command openssl enc -ciphers is used to display a list of the cipher algorithms that are
available for use with the OpenSSL encryption command (enc). This includes symmetric encryption
algorithms like AES, DES, and others.

Part 3: Symmetric Encryption Using AES


Symmetric encryption is a type of encryption where the same key is used for both encryption
and decryption. This means that both the sender and the recipient must share a common secret key,
which must be kept confidential to maintain the security of the communication.
Part 4: Asymmetric Key Generation Using RSA

Asymmetric key generation using RSA (Rivest-Shamir-Adleman) is a widely used method for
generating a pair of cryptographic keys: a public key and a private key. These keys are used for
secure data transmission and digital signatures.

Key Concepts

 Public Key: This key is shared with everyone. It can be used to encrypt data or verify a digital
signature.
 Private Key: This key is kept secret and is used to decrypt data or create a digital signature. It must be
protected at all costs.

Step 5: Encrypting and Decrypting Using RSA


Solution:

Encrypting and decrypting data using RSA involves using a pair of keys (public and private)
generated by the RSA algorithm. RSA is widely used for secure data transmission, especially in
scenarios where a shared secret key cannot be used securely.

Key Concepts

 Public Key: Used for encryption. It can be shared openly.


 Private Key: Used for decryption. It must be kept secret and secure.

Encryption Process

1. Generate RSA Key Pair: You first need a pair of keys (public and private). This can be done
using OpenSSL as previously described.
2. Encrypt Data: Use the public key to encrypt the plaintext data.E.g: I want to hake whole
system of israel
Decryption Process

1. Decrypt Data: Use the private key to decrypt the ciphertext back to plaintext.

You might also like