Question: Cryptography Refresher You will continue your role as a security analyst working for the Hill Valley Police Department. In the last class, you determined that

Cryptography Refresher
You will continue your role as a security analyst working for the Hill Valley Police Department.
In the last class, you determined that the Alphabet Bandit is likely an insider, as a forged message told you to investigate outside of the Hill Valley Police Department.
Since the Alphabet Bandit has yet to be identified, and in order to protect your fellow police officers, you want to remind everyone to be sure to use digital signatures to create and verify messages.
Your task is to create a message reminding your fellow officers to use digital signatures.
Be sure to follow your own advice by clearsigning the message, and then share it with your fellow officers.
Instructions
Verify that you can see your GPG key by running gpg --list-keys.
Note: If you can't see your GPG key, reinstall it using gpg --gen-key.
sysadmin@UbuntuDesktop:~$ gpg --list-keys
/home/sysadmin/.gnupg/pubring.kbx
---------------------------------
pub rsa30722020-05-27[SC][expires: 2022-05-27]
FE5AAFF8365F5CD2DB305089DDD05BF1DC3F40C8
uid [ultimate] sysadmin
sub rsa30722020-05-27[E][expires: 2022-05-27]
Write a simple message reminding your fellow Hill Valley officers to sign and verify all messages until further notice.
Using GPG, clearsign the message with a digital signature, and name your output file with your name, such as: Important_Communication_by_Myname
Working with the same partner as in the asymmetric key activity from last class, send the clearsigned message to the partner.
Note: If this partner isn't available, join another group to exchange exported public keys and clearsigned messages with.
Once you receive the clearsigned message from your partner, use GPG to verify the message is authentic.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!