User Authentication and Key Establishment for Secure Communications Lab

Description

Investigate the process of obtaining a personal certificate or digital ID for e-mail usage. What information is needed, what are the costs, and what protection is afforded based on the vendor? 

2nd assignment in the auditing class 

As this is the final discussion forum for the semester, I wanted to keep the question simple.  Describe one aspect of the presentations or lectures – what was your key take-a-way with regard to these topics, and why?  You can limit your post to 3-4 sentences.  Thank you for your contributions. to our discussion forums.

NET 477 Homework#4 Spring 2021 Total points 100 Due by Wednesday 06/02 11:59 PM. Part 1: (80 points) In this Lab we will use CrypTool to generate encryption keys, sign a document, verify a signature, and extract a signature. Before we continue, let’s recap how a signature works. A document has a unique hashed value. This hashed value can be encrypted with an individual’s private key to tie the document to the holder of the private key. The encrypted hashed value is called a digital signature, and generating such a value for a document is referred to as digitally signing a document. First, launch Cryptool we installed in our previous lab(if you still have it installed if not please reinstall). Click on File and New from the top menu bar. In the blank window type the following message: It is a great day at DePaul University.

If you have the key pair we generated previously, skip to the next paragraph. Otherwise, generate another one following the instructions here. Click on Digital Signature/PKI and PKI from the menu bar. Select Generate/Import keys. In the popup window, select RSA and complete the User Data section on the right. In addition to Last name and First name, enter a PIN (e.g., 1234). Click on the Generate new key paid button at the bottom of the screen. You will receive a message that the keys have been successfully saved. Close any open windows except the windows with our message: It is a great day at DePaul University. On the top menu bar, click on Digital Signature/PKI, and Sign Document. In the “Choose hash function” section, check SHA-1 160 bits. In the “Choose signature algorithm” section, check RSA. Highlight the key pair you generated in the middle of the window. Remember to enter your PIN in the “PIN code for chosen PSE:” field. Click on the Sign button and the digital signature will be displayed in the “RSA (SHA1) signature of” window.

Capture this window and paste the screenshot in below: Next, leave the “RSA (SHA1) signature of” window with the signature open. Click on Digital Signature/PKI and then Verify Signature from the top menu bar. In the “Signature Verification” window, highlight the same key pair you just used to sign the document and click on the Verify Signature button on the bottom left of the window. You will receive a “Correct signature!” message to confirm that the signature is correct. Capture the pop-up window with the message and paste the screenshot below: Click OK to close the pop-up window. The signature is verified as correct because it is the same as what we just generated. If you erase or modify some hexadecimal numbers in the signature, and repeat the earlier steps in this paragraph to verify it, you will receive an “Invalid signature!” message instead. Click on Digital Signatures/PKI and Extract Signature from the top menu bar.

In the “Extracted Signature” window, the signature and the signed message “It is a great day at DePaul University ” are displayed. Capture the “Extracted Signature” window and paste the screenshot below: Click Close to exit the window. Lastly, create a text file on your PC, add any text you would like, and save it as MYTEST. Go back to CrypTool, click on Digital Signatures/PKI, and select Signature Demonstration (Signature Generation). The “Step by Step Signature Generation” window contains a schematic diagram of the digital signature process. Click on the green Open document box or the file icon on its bottom left. Navigate to and select/open the MYTEST file you just created. Click on the red Select Hash function box. Choose SHA-1 and then click OK to close the pop-up window. Click on the red Compute hash value box and the blue Hash value box next. The hash value of your MYTEST file is now displayed at the bottom of the window. Click on the red Generate key box in the schematic diagram. In the “Generate RSA Key” pop-up window, click on the Generate prime numbers button to accept default values. In the next “Prime Number Generation” window, click on the Generate prime numbers button on the bottom left of the page, and then the Apply primes button to finalize the key generation. Click on the Store key button in the “Generate RSA key” window and go back to the schematic diagram. Click on the red Encrypt hash value box and then the blue Encrypted hash value box below.

The Encrypted hash value is now displayed at the bottom of the window. Click on the red Provide certificate box above. Enter Last name, First name, and a PIN (confirm the PIN) in the “Personal data for the certificate” section. Click on the Create Certificate and PSE button on the bottom left of the window to create a certificate. Click on the red Generate signature box in the schematic diagram. Click on the blue Signature box below that to display the SHA-1 signature of at the bottom of the window. Click on the yellow Store signature box and wait for the pop-up window with the “…have generated a new RSA key and stored it together with a certificate…” message. Capture the pop-up screen and paste the screenshot below:. Click OK and close the pop-up window. Part2(20 points) 1. What is the purpose of a digital certificate?

A.It binds a CA to a user’s identity. B.It binds a CA’s identity to the correct RA. C.It binds an individual to an RA. D.It binds an individual to a public key. 2. Which of the following properly describes what a public key infrastructure (PKI) actually is? A.A protocol written to work with a large subset of algorithms, applications, and protocols B.An algorithm that creates public/private key pairs C.A framework that outlines specific technologies and algorithms that must be used D.A framework that does not specify any technologies, but provides a foundation for confidentiality, integrity, and availability services 3. When a user wants to participate in a PKI, what component does he or she need to obtain, and how does that happen? A.The user submits a certificate request to the CA. B.The user submits a key pair request to the CRL. C.The user submits a certificate request to the RA. D.The user submits proof of identification to the CA. 4. What steps does a user’s software take to validate a CA’s digital signature on a digital certificate? A.The user’s software creates a message digest for the digital certificate and decrypts the encrypted message digest included within the digital certificate. If the decryption performs properly and the message digest values are the same, the certificate is validated. B.The user’s software creates a message digest for the digital signature.

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at EssayBell.com

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at EssayBell.com. We assure you of a well written and plagiarism free papers delivered within your specified deadline.