Professional Documents
Culture Documents
Lab Sheet 1
Lab Sheet 1
Lab Sheet 1
MARKS:
/
20
NO: 1
DURATION: 2 hours
Lab Objectives:
Through this lab sheet, student will have the ability to: 1. Study the cryptographic tools. 2. Learn cryptography concept and application. 3. Investigate some common attacks and analysis for cryptography.
Instructions:
1. This work should do individually. 2. Report must be submitted based on tasks given below. The report must have print screen explanation (8 marks), your own analysis and finding (8 marks) and reflection of these lab sheet objectives (4 marks). 3. The assignment must be submitted in a format as follows: a. Font : Century Gothic b. Size : 10 c. Line Spacing : 1.15 lines d. File naming(caps lock) :<BCN2023_LAB1_matrixnum> e.g BCN2023_LAB1_CA02057 4. Report submission: Monday (15/10/12) before 11.55 pm through moodle.
Tasks:
(A)
1. Install CrypTool (SetupCrypTool_1_4_30_en.exe).Download it from this site (http://www.cryptool.org/en/ct1-download-en) 2. The application CrypTool is a comprehensive educational program about cryptography and cryptanalysis. You can use it to apply and analyze cryptographic algorithms. 3. Apply and Use this tool to learn cryptography concept for : a. Classic Crypto (Caesar, Playfair ,Vigenere and Permutation/transposition cipher) b. DES c. Triple DES
(B)
1. Search on net other cryptographic tools available and their features. Features may be in terms of size, speed, different algorithms, etc. 2. Do findings on the tool and compares it with the given tool in task A; CrypTool.
Processes: Shift->10 A F K P U Z K P U Z E J M=W O=Y H=R D=N F=P A=K D=N H=R I=S L=V L Q V A F M R W B G N S X C H O T Y D I B G L Q V C H M R W D I N S X E J O T Y
B) Play fair
U C H O V
M D I/J Q W
P E K R X
A F L S Y
B G N T Z
U C H O
M D I/J Q
MO=UQ
C H
D I/J
HD=IC
A F L
FA=FL
C H
D I/J
DH=CI
I/J K L N
IL=KN
C) Vigenere
Encription Key=UMP
M U G O M A H P W D U X F M R A P P D U X H M T I P X L U F
D) Permutation/Transposition cipher
F 3
A D Encryption 1 2
H 3
I 1
L 2
A 2
D F Decryption 3 1
I 2
L 3
H 1
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
FADHIL
Shift 4 Encryption JEHLMP Shift 3 Decryption GBEIJM Shift 2 Encryption Data sent IDGKLO
For Receiver:
FADHIL
(B)
1. Search on net other cryptographic tools available and their features. Features may be in terms of size, speed, different algorithms, etc. 2. Do findings on the tool and compares it with the given tool in task A; CrypTool. Name Cryptographic Tool
1) GNU Privacy Guard
Size
Speed
Algorithm
Other
1.4 MB
Longer.
2)
Disk Utility
47 KB
Longer.
3)
TrueCrypt
3.31 MB
Faster.
Using asymmetric keypairs individually generated by GnuPG users. Triple DES. To verify the file structure of the current boot drive. Using on-the-fly encryption (OTFE). It can create a virtual
encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Window s 2000) the entire storage device (pre-boot authentication). 4) 7-zip 1.09M B. 3.25M B. Faster.
Strong AES-256 encryption in 7z and ZIP formats
Free.
5)
AxCrypt
Faster.
Size
Speed
Algorithm
Other
36MB.
Faster.
Classical For ciphers are Windows available only. Free. alongside asymmetric cryptography including RSA, elliptic curve cryptography , digital signatures and DiffieHellman key exchange.
AxCrypt
3.25MB.
Faster.