Question: Brute force attack is common approach that is used to break the secret key. Using Cryptool 1, you need to launch brute force attack to

Brute force attack is common approach that is used to break the secret key.

Using Cryptool 1, you need to launch brute force attack to break the DES secret key .

Digital signatures are used for sender authentication, data integrity and non-repudiation. In Cryptool 2, you need to develop your own digital signature generation and verification module.

Question 1 (Cryptool 1)

A DES encrypted message is given in this file:

Q~/NGGVm3{&A"3i 8

You have been lucky; you have seen some part of the key 12 34 56 78 90 ** ** **.

With the help of Cryptool 1, break the key and decipher the given text.

a)

How long time will it take you to compromise the complete key by using a

brute force attack?

b)

What is the complete secret key?

c)

What is the decrypted text?

Note: Provide the screenshot of every step to get full marks.

Question 2 (Cryptool 2)

In the Cryptool 2, develop your own RSA digital signature generation and verification component.

a)

Generate the hash value using built-in SHA-1 module

b)

Encrypt has value using built-in RSA Cipher module

c)

Display Signature in text format.

d)

Develop Signature Verification component and display result in text format

Note :Should be Provide the screenshot of every step .

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!