Question: Brute force attack is common approach that is used to break the secret key. Using Cryptool 1, you need to launch brute force attack to
| Brute force attack is common approach that is used to break the secret key. | |
|
| Using Cryptool 1, you need to launch brute force attack to break the DES secret key . |
| Digital signatures are used for sender authentication, data integrity and non-repudiation. In Cryptool 2, you need to develop your own digital signature generation and verification module. | |
|
| |
| Question 1 (Cryptool 1) | |
| A DES encrypted message is given in this file: Q~/NGGVm3{&A"3i 8 | |
| You have been lucky; you have seen some part of the key 12 34 56 78 90 ** ** **. | |
| With the help of Cryptool 1, break the key and decipher the given text. | |
| a) | How long time will it take you to compromise the complete key by using a |
|
| brute force attack? |
| b) | What is the complete secret key? |
| c) | What is the decrypted text? |
| Note: Provide the screenshot of every step to get full marks. | |
| Question 2 (Cryptool 2) | |
| In the Cryptool 2, develop your own RSA digital signature generation and verification component. | |
| a) | Generate the hash value using built-in SHA-1 module |
| b) | Encrypt has value using built-in RSA Cipher module |
| c) | Display Signature in text format. |
| d) | Develop Signature Verification component and display result in text format |
| Note :Should be Provide the screenshot of every step . | |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
