Question: Description You will create four encrypted files on a shared drive. Each file will be encrypted with a different encryption scheme or method. Then, a
Description
You will create four encrypted files on a shared drive. Each file will be encrypted with a
different encryption scheme or method. Then, a fellow student will access the shared drive and
attempt to decrypt the files to obtain the information contained within them. You will also be
attempting to decrypt and read the four files created by that fellow student in the same shared
drive.
Your four file types will be:
A text file. This can be created using any text editor like WordPad or Note The data
contained will be some form of a list, but you can decide what that list is no hints for
your fellow student! An example of this type of file might be a list of authorized
usernames.
A spreadsheet or tableformatted file that contains both text and numerical
information. It does not have to be created in a spreadsheet program like Excel but
when the file opens, it should display the information in a table structure. It should
contain at least three columns and several rows. DO NOT USE ACTUAL DATA, but invent
your own "dummy" data. An example of this type of file would be a list of credit card
information cardholder name, account number, Expiration date, VIN code
A log file. This would be a large file where each line has a similar format. You can create
the file by copying and pasting, just remember to change some values in each line.
A document that simulates some report. You can use a document you already have like
an old homework assignment but remember to remove any sensitive information. The
document can be written in a word processing program like Word or Pages or some
other app, but it cannot be simple text. It should contain formatted data like a report
would have, with headings and paragraphs.
Encryption
Each of the above four files will be encrypted. You will use a different encryption algorithm for each file.
Nobody else except for me will know the encryption algorithm used, so it would be just like a hacker
attempting to obtain information from files stored on a server. There are various free tools available for
downloading that helps encrypt files. Please do NOT ask me for suggestions, as the "best" tool will vary
based upon the operating system, current upgrades, and other system configuration variables on your
particular computer, so any "advise" I give will be conditional at best.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
