LAB GUIDE Using Encryption To Enhance Confidentiality and Integrity
LAB GUIDE Using Encryption To Enhance Confidentiality and Integrity
Before you begin the guided lab exercises, please review the following preparation checklist.
1. Run the System Checker. The System Checker will confirm that your browser and network
connection are ready to support virtual labs.
2. Review the Common Lab Tasks document. This document provides an overview of the virtual
lab environment and outlines several of the recurring tasks you may need to complete your lab
exercise.
3. When you've finished, use the Disconnect button to end your session and create a
StateSave. To end your lab session and save your work, click the Disconnect button in the
upper-right corner of the Lab View toolbar. When prompted, assign a name for your StateSave
(we recommend using the Section, Part, and Step number where you stopped) and click
Continue. Please note that a StateSave will preserve any changes written to disk in your lab
session. A StateSave will not preserve any open windows or active processes, similar to
restarting your computer.
If you close your browser window without disconnecting, your lab session will automatically
end after 5 minutes.
4. Technical Support is here to help! Our technical support team is available 24/7 to help
troubleshoot common issues.
Please note that the 24/7 support team is Level 1 only, and cannot assist with questions about
lab content or the array of software used in the labs. If you believe you’ve identified an error in
the lab guide or a problem with the lab environment, your ticket will be escalated to the Jones
& Bartlett Learning product team for review. In the meantime, we recommend resetting the lab
(Options > Reset) or reaching out to your instructor for assistance.
Page 1 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Introduction
As computers, tablets, phones and other “always on” digital devices become increasingly
interconnected through unsecure public networks, threats against our privacy and digital security
increase in kind. Threats like identity theft and credit fraud threaten our financial security. Digital
stalking and online harassment threaten our physical and emotional security. Some suggest that
digital surveillance, mass data collection, and data mining by government and commercial entities
encroach on our right to free speech, our freedom of association, and our Constitutional protections
against unlawful search and seizure.
The need to protect confidential and private information over “public” networks is an ancient one. The
solution then, as now, is to encode private data using cryptography. Simply put, cryptography takes
human readable information and makes it unreadable “cipher text” which can only be read if one
possesses the correct key. Generally speaking, there are three cryptographic standards: symmetric
cryptography, asymmetric cryptography, and hybrid cryptography.
With symmetric cryptography the sender and receiver use the same key (or “shared secret”) to
encrypt and decrypt a given message. Symmetric cryptography is quite fast and generally easier to
implement than asymmetric cryptography. However, while symmetric cryptography does provide
confidentiality and integrity, it does not guarantee authenticity. In other words, you do not know for
certain who gave you the encrypted message.
With asymmetrical encryption, the receiver has two keys: a private key and a public key. The sender
encrypts the message with the receiver’s public key, and the receiver decrypts the message with their
private key. While asymmetrical encryption is slower and more complex than symmetrical encryption,
it does guarantee the authenticity of the sender.
The hybrid approach is to have the sender encrypt the message with a symmetric key, and then send
the message and a copy of the symmetric key using the recipient’s asymmetric public key. The initial
message and symmetric key are decrypted using the recipient’s public key, and subsequent
messages are then decrypted quickly using the symmetric key. The hybrid approach provides the
same full CIA protection as asymmetrical encryption with nearly the same speed as symmetrical
encryption.
In this lab, you will learn how cryptography tools can be used to ensure message and file transfer
integrity and how encryption can be used to maximize confidentiality. You will use Kleopatra, the
certificate management component of GPG4Win, to generate both a public and private key as both a
sender and a receiver. You will use the sender’s keys to encrypt a file, send it to the receiver, and
decrypt it using the receiver’s copy of the keys.
Learning Objectives
Upon completing this lab, you will be able to:
Page 2 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
confidentiality
2. Understand public and private key pairs and basic asymmetric cryptography
Lab Overview
Each section of this lab is assigned at your instructor’s discretion. Please consult your
instructor to confirm which sections you are required to complete for your lab assignment.
SECTION 1 of this lab has four parts, which should be completed in the order specified.
1. In the first part of the lab, you will create a public and private key pair for the senders account
on the vWorkstation desktop.
2. In the second part of the lab, you create a public and private key pair for the receiver’s
account on the remote desktop, TargetWindows02.
3. In the third part of the lab, you will transfer and import the public key from the receiver,
TargetWindows02.
4. In the fourth part of the lab, you will encrypt a file on the vWorkstation desktop using the
receiver’s public key and the sender’s private key, send it to the remote machine, and then
decrypt the file.
Page 3 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
SECTION 2 of this lab allows you to apply what you learned in SECTION 1 with less guidance and
different deliverables, as well as some expanded tasks and alternative methods. You will import a new
public key and decrypt a file found in the lab.
Finally, you will explore the virtual environment on your own in SECTION 3 of this lab. You will answer
questions and complete challenges that allow you to use the skills you learned in the lab to conduct
independent, unguided work, similar to what you will encounter in a real-world situation.
Topology
This lab contains the following virtual devices. Please refer to the network topology diagram below.
GPG4Win (Kleopatra)
Deliverables
Upon completion of this lab, you are required to provide the following deliverables to your instructor:
SECTION 1:
Page 4 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Secret-message.txt.gpg;
none;
SECTION 2:
Page 5 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
your name and email address in the Certificate Server Certificate Lookup dialog box;
the Certificate Details dialog box for the imported certificate;
the successfully decrypted file;
Secure_reply.txt.gpg;
SC-PublicKey.asc;
none.
SECTION 3:
Page 6 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Part 1: Create a Public and Private Key Pair for the Sender
Note: In the next steps, you will use Kleopatra to create a set of keys (private and public) that will
enable you to encrypt and decrypt a file later in this lab. Keys are also referred to as certificates. Your
public key can be used by others to encrypt files, which you can then decrypt with your own private
key. You only need to provide your public key, never your private key.
1. On the vWorkstation desktop, double-click the Kleopatra icon to open the Kleopatra
component of the GPG4Win application.
Page 7 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Kleopatra window
2. From the Kleopatra menu bar, click Settings and select Configure Kleopatra to open the
Configure - Kleopatra window.
Configure Kleopatra
Page 8 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
3. In the Configure - Kleopatra window, click the New button in the top right corner to add a new
directory services server.
4. In the Configure - Kleopatra window, click OK to accept the default server name,
keys.gnupg.net, and close the window.
5. From the Kleopatra menu bar, click File and select New Certificate to open the Certificate
Creation Wizard.
6. In the Certificate Creation Wizard, click the Create a personal OpenPGP key pair option.
Page 9 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
7. At the Enter Details screen, type the following information, replacing the placeholder text with
your own information, then click Next to continue.
Note: A valid email address is required for testing purposes. Your instructor should advise you to use
your school email address, or to create a new one using a free email service (i.e., Gmail, Yahoo,
Hotmail, etc.) for use during this course. You will give your instructor the email address you used in
this lab so s/he may verify it as part of your homework.
The Comment box can remain empty. While not required to create a key pair, it can be useful if you
are creating a certificate for a specific purpose, such as testing or for a specific client. If you do add a
comment, it becomes part of your login name, and will be visible to the receiver.
Page 10 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
A pinentry (pin entry) dialog box will pop up to complete the creation of a key. You need to
enter a passphrase, or password.
9. In the pin entry dialog box, type 1Tsecurity! and click OK.
As you type, notice that the Quality meter below the passphrase changes to indicate the
degree of security offered by the passphrase. A password that includes upper- and lowercase
letters as well as numbers is more secure than one that uses only numbers, such as a
birthdate, or a recognizable word, such as password.
Page 11 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
10. When prompted to enter the passphrase again, type 1Tsecurity! and click OK to generate
the key.
When the key is successfully created, a unique 40-character fingerprint will appear in the
Result area of the dialog box. With the key created, you have several options for handling it:
Make a Backup Of Your Key Pair. This option sends a copy of your private key to
your computer where you can store it anywhere you’d like.
Send Certificate By e-Mail. This option will create a new e-mail and automatically
attach your public key certificate.
Upload Certificate To Directory Service. You can store your certificate on a public
Internet server.
Page 12 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
11. Make a screen capture showing the fingerprint generated by the key creation process
and paste it into your Lab Report file.
12. In the Certificate Creation Wizard, click the Upload Certificate to Directory Service button,
then click Continue to ignore the warning message.
Please note that the key management server used in this lab exercise is a public directory
server, and is known to periodically produce an error message when attempting to export a
certificate. If you receive an error message at this step, click OK and repeat step 12.
If the issue persists, close the Certificate Creation Wizard and skip to Step 19. In place of
the screen capture required at Step 17, make a screen capture of the Export error.
Page 13 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
13. When prompted, click OK acknowledge the export process was successful.
14. In the Certificate Creation Wizard, click Finish to close the Certificate Creation Wizard.
The new certificate appears in the My Certificates tab of the Kleopatra application. The Key-ID
is the same as the last 8 digits of the fingerprint associated with this certificate. Each new
certificate is created with no expiration (valid until) date, but you can set an expiration date in
the Certificate Details screen. A key pair that has expired can be re-enabled with the private
key and the passphrase. To revoke a key (render it unusable), you can create a special
revocation signature file. Revocation keys cannot be created in the Kleopatra application.
15. On the Kleopatra toolbar, click the Lookup Certificate on Server button to open the
Certificate Server Certificate Lookup window and verify the certificate.
Page 14 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Verify certificate
16. In Certificate Server Certificate Lookup window, in the Find box, type the test email
address you used to create the certificate, then click Search to confirm the certificate was
uploaded to the Public Directory server.
This process may take several minutes; you may click the Search button repeatedly to refresh
the results of this screen. When your test email address appears in the search results section,
adjust the column widths so that your name and email address are visible in their entirety.
Remember that this is a Public Directory server, and is not part of the JBL lab environment. If
your test email address does not show up after several minutes, we recommend closing the
lab, creating a StateSave, waiting an hour and trying again. Please note that because this
server is external to the JBL lab environment, Technical Support will not be able to assist with
issues related to searching for your certificate.
Page 15 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Certificate search
17. Make a screen capture showing your own test email address in the Certificate Server
Certificate Lookup window and paste it into your Lab Report file.
18. In Certificate Server Certificate Lookup window, click Close to close the window.
19. In the Kleopatra window, click your newly created certificate to select it.
Page 16 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Certificate preview
20. With the certificate selected, click File and select Export Secret Keys to save your private
(secret) key.
Export certificate
Page 17 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
21. In the Export Secret Certificate dialog box, click the Browse button to open the Save As
dialog box, then navigate to the vWorkstation desktop (This PC > Users > Administrator >
Desktop), type DesktopKey-private in the File Name box, and click Save to return to the
Export Secret Certificate dialog box.
22. In the Export Secret Certificate dialog box, click OK to save a copy of your private key and
close the dialog box.
24. In the Kleopatra window, double-click the certificate you created to view all details related to
the certificate:
Note that the key type is RSA. Kleopatra uses both RSA (Rivest, Shamir, and Adelman
encryption algorithm) and DSA (Digital Signature Algorithm) for encryption. Kleopatra uses
RSA as the default encryption algorithm, but you could select DSA when creating a new
certificate by clicking the Advanced Settings button on the Enter Details.
Page 18 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Certificate details
25. In the Certificate details window, click Close to close the window.
26. In the Kleopatra window, with your certificate highlighted, click the Export Certificates
button on the Kleopatra toolbar to save a copy of your public key.
Page 19 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Part 2: Create a Public and Private Key Pair for the Receiver
Note: In the next steps, you will use Kleopatra to create a set of keys on the remote TargetWindows02
desktop. You will use this key later in this lab to encrypt a file.
Username: Administrator
Password: P@ssw0rd!
Page 20 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
The remote desktop opens with the IP address of TargetWindows02 (172.30.0.10) in the title
bar at the top of the window.
3. On the TargetWindows02 desktop, double-click the Kleopatra icon to open the Kleopatra
component of the GPG4Win application.
4. Repeat Part 1, Steps 5-10 to create a personal OpenPGP key pair using the following
information:
Name: TargetWindows02
EMail: [email protected]
Pinentry Passphrase: 1Tsecurity!
5. When the key pair has been successfully created, click Finish to close the Certificate Creation
Wizard.
6. Repeat Part 1, Steps 19-23 to export the private key for this machine and save it to the
TargetWindows02 desktop.
7. Repeat Part 1, Steps 26-27 to export a copy of the public key and save it to the
TargetWindows02 desktop.
1. On the TargetWindows02 RDP title bar, click the Restore down button to reduce the size of
Page 21 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
the remote connection window and display both vWorkstation and TargetWindows02 desktops.
If necessary, reposition the windows so that the public and private keys for both machines
are visible.
4. On the vWorkstation desktop, right-click any empty space and select Paste from the context
menu to copy the file to the vWorkstation desktop.
Page 22 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
6. On the vWorkstation taskbar, click the Kleopatra icon to restore the Kleopatra window.
Page 23 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Kleopatra icon
7. On the Kleopatra toolbar, click the Import Certificates button to open the Select Certificate
File dialog box.
8. In the Select Certificate File dialog box, navigate to the Desktop (This PC > Desktop),
then select the TargetWindows02-public.asc file and click Open to import the file.
Page 24 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
The TargetWindows02-public.asc file is now listed as a new line item on the Imported
Certificates tab of the Kleopatra application.
Page 25 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
10. In the Kleopatra window, double-click the TargetWindows02 certificate to open the
Certificate Details window.
Page 26 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
11. In the Certificate Details window, under Actions, click the Trust Certificates made by this
Certificate button to open the Change Trust Level window.
12. In the Change Trust Level window, select the I believe checks are very accurate radio
button to assign full trust to certificates made by TargetWindows02.
Page 27 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
13. In the Change Trust Level window, click OK to close the window.
14. When prompted, click OK to close the Owner trust changed successfully dialog box.
15. In the Certificate Details window, click the Close button to close the window.
Page 28 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
1. On the vWorkstation desktop, right-click any empty space and select New > Text
Document from the context menu.
2. With New Text Document highlighted, type secret-message and press Enter to name the
new file.
3. On the vWorkstation desktop, double-click the secret-message icon to open the file in the
Notepad application.
4. In the Notepad window, type I like information systems security, then press
Enter and type yourname, replacing yourname with your own name.
Page 29 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Create secret-message.txt
5. On the Notepad menu bar, click File > Exit, then click Save when prompted to save the file
and close Notepad.
6. On the vWorkstation desktop, right-click the secret-message.txt file and select Sign and
Encrypt from the context menu to open the Sign/Encrypt Files dialog box.
Page 30 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
7. In the Sign/Encrypt Files dialog box, click the Remove unencrypted original file when done
checkbox and click Next to continue.
Page 31 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
8. In the Sign/Encrypt Files dialog box, select both the TargetWindows02 certificate and the
personal certificate that you created in Part 1 of this lab, then click the Add button.
Selecting both certificates will tell Kleopatra to use the TargetWindows02 (receiver’s) public
key and your (sender’s) private key to encrypt the message. Adding both keys will allow both
the sender and the receiver to decrypt the file.
Page 32 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
9. In the Sign/Encrypt Files dialog box, click the Encrypt button to continue.
When the secret-message file is successfully encrypted, Kleopatra will delete the original file
and replace it with an encrypted (.gpg) file: secret-messsage.txt.gpg.
Page 33 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Successful encryption
Note: In the next steps, you will transfer the encrypted secret-message.txt.gpg file from the
vWorkstation to TargetWindows02.
Page 34 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
12. On the vWorkstation desktop, right-click the secret-message.txt.gpg file and select Copy
from the context menu.
14. On the TargetWindows02 desktop, right-click any empty space and select Paste from the
context menu to copy the secret-message.txt.gpg file to the TargetWindows02 desktop.
Note: In the next steps, you will decrypt the file you just transferred. You can verify that the integrity of
encrypted files is maintained during transmission by comparing the decrypted file’s contents with the
file you created earlier in the lab. You will then make a screen capture of the successful file decryption
for use as a deliverable in this lab.
16. On the TargetWindows02 desktop, right-click the secret-message.txt.gpg file and select
Decrypt and verify from the context menu to open the Decrypt/Verify Files dialog box.
Page 35 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
17. At the bottom of the Decrypt/Verify Files dialog box, click the Decrypt/Verify button to
decrypt the secret-message file.
18. When prompted, type 1Tsecurity! (the passphrase you used when you created the
encryption file) and click OK.
19. If necessary, reposition the Decrypt/Verify Files dialog box so that both the original
encrypted file and the new secret-message file are visible on the TargetWindows02 desktop.
20. On the TargetWindows02 desktop, double-click the newly decrypted secret-message file to
open the file in Notepad.
Page 36 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
21. Reposition the open windows so that the Decrypt/Verify Files dialog box and the Notepad
window are visible.
Decrypted message
22. Make a screen capture showing the Kleopatra decryption results window and the secret-
message.txt file in Notepad, and paste it into the Lab Report.
Note: This completes Section 1 of this lab. In the next steps, you will use the File Transfer folder to
move any files from the vWorkstation to your local system that are to be submitted as part of your lab
deliverables. Refer to the instructions in the Common Lab Tasks document for more information on
how to use this function.
Page 37 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
25. On the vWorkstation desktop, drag and drop the following files into the File Transfer folder to
complete the download to your local computer.
secret-message.txt.gpg
Page 38 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Please confirm with your instructor that you have been assigned Section 2 before proceeding.
2. If you already completed Section 1 of this lab, you will need to reset the virtual environment
before beginning Section 2. To reset the virtual environment, complete one of the following
options.
a. Click Options > Reset Lab to restore all virtual machines to their base state. This will take
several minutes to complete. If you do not see the vWorkstation desktop after five minutes,
click Options > Reload Lab to reload your lab connection.
b. Click Disconnect, then select Discard Changes to end your lab session without creating a
StateSave. If you previously created a StateSave, delete the StateSave at the launch page,
then start a new lab session.
Page 39 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
1. From the vWorkstation desktop, open the Kleopatra component of the GPG4Win application.
2. Create a new Directory Services server, accepting the default server, keys.gnupg.net.
3. Create a new personal OpenPGP key pair certificate using the following information.
Note: A valid email address is required for testing purposes. Your instructor should advise you to use
your school email address, or to create a new one using a free email service (i.e., Gmail, Yahoo,
Hotmail, etc.) for use during this course. You will give your instructor the email address you used in
this lab so s/he may verify it as part of your homework.
The Comment box can remain empty. While not required to create a key pair, it can be useful if you
are creating a certificate for a specific purpose, such as testing or for a specific client. If you do add a
comment, it becomes part of your login name, and will be visible to the receiver.
When the key is successfully created, a unique 40-character fingerprint will appear in the
Result area of the dialog box. With the key created, you have several options for handling it:
Make a Backup Of Your Key Pair. This option sends a copy of your private key to
your computer where you can store it anywhere you’d like.
Send Certificate By e-Mail. This option will create a new e-mail and automatically
attach your public key certificate.
Upload Certificate To Directory Service. You can store your certificate on a public
Internet server.
5. Make a screen capture showing the fingerprint generated by the key creation process
and paste it into your Lab Report file.
6. Upload the Certificate to Directory Services, then close the Certificate Creation Wizard.
The new certificate appears in the My Certificates tab of the Kleopatra application. The Key-ID
is the same as the last 8 digits of the fingerprint associated with this certificate. Each new
Page 40 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
certificate is created with no expiration (valid until) date, but you can set an expiration date in
the Certificate Details screen.
Note: Please note that the key management server used in this lab exercise is a public directory
server, and is known to periodically produce an error message when attempting to export a certificate.
If you receive an error message at this step, click OK and repeat step 6.
If the issue persists, close the Certificate Creation Wizard and skip to step 11. In place of the screen
capture required at Step 9, make a screen capture of the Export error.
8. Search for the test email address you used to create the certificate to confirm the certificate
was uploaded to the Public Directory Server.
This process may take several minutes; you may click the Search button repeatedly to refresh
the results of this screen. When your test email address appears in the search results section,
adjust the column widths so that your name and email address are visible in their entirety.
Page 41 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Certificate search
9. Make a screen capture showing your own email address in the Certificate Server Certificate
Lookup window and paste it into your Lab Report file.
11. Select your certificate, then select File > Export Secret Keys and save your private (secret)
key to the vWorkstation desktop as DesktopKey-private.gpg.
12. In the Kleopatra window, double-click your certificate to view all details related to the
certificate:
Note that the key type is RSA. Kleopatra uses both RSA (Rivest, Shamir, and Adelman
encryption algorithm) and DSA (Digital Signature Algorithm) for encryption. Kleopatra uses
RSA as the default encryption algorithm, but you could select DSA while you create a new
certificate by clicking the Advanced Settings button on the Enter Details.
Page 42 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Certificate details
14. Select your certificate, then select File > Export Certificates and save your public key to
the vWorkstation desktop as DesktopKey-public.asc.
1. Import the SC-PrivateKey.gpg (the student certificate) from the Cert folder (This PC > Local
Page 43 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
The new certificate will appear as a new line item on the Imported Certificates tab of the
Kleopatra application.
2. Export the public key for the imported certificate to the vWorkstation desktop as SC-
PublicKey.asc.
Notice that only the This is my certificate option is available. This is a private key created by
the vWorkstation, so this is the correct option.
Page 44 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
4. Make a screen capture showing the Certificate Details for the student certificate and paste
it into your Lab Report file.
Page 45 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
2. When prompted, type 1Tsecurity! (the passphrase associated with the encrypting key) and
click OK.
3. Without closing the Decrypt/Verify files dialog box, open the newly decrypted Secure_note.txt
file in Notepad.
4. Reposition the open windows so that the Decrypt/Verify Results window and the decrypted
Secure_note.txt file in Notepad are visible.
5. Make a screen capture showing the Kleopatra decryption results window and
the Secure_note.txt file in Notepad, and paste it into the Lab Report.
6. Close the Notepad window, Decrypt/Verify Files dialog box, and the File Explorer
window.
Page 46 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
Note: In the next steps, you will create a file on the vWorkstation that responds to the encrypted
message from Part 3. You will encrypt your reply using the keys you imported earlier in this lab.
1. On the vWorkstation desktop, create a new text file titled Secure_reply.txt, then open the
text file and type a reply to the decrypted Secure_note.txt.
2. Encrypt the Secure_reply.txt file using the imported certificate and the personal certificate
that you created in Part 1 of this lab.
Selecting both certificates will tell Kleopatra to use the imported key and your personal key to
encrypt the message. Adding both keys will allow both certificates to decrypt the file.
Page 47 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
3. Close Kleopatra.
Note: This completes Section 2 of this lab. In the next steps, you will use the File Transfer folder to
move any files from the vWorkstation to your local system that are to be submitted as part of your lab
deliverables. Refer to the instructions in the Common Lab Tasks document for more information on
how to use this function.
4. On the vWorkstation desktop, drag and drop the following files into the File Transfer folder to
complete the download to your local computer.
Secure_reply.txt.gpg
SC_PublicKey.asc
Page 48 of 49
Using Encryption to Enhance Confidentiality and Integrity
Fundamentals of Information Systems Security, Third Edition - Lab 07
2. Would it be possible to encrypt the secret-message.txt file using only the TargetWindows02
(receiver’s) public key? What would be the ramifications of doing this?
1. PGP encryption can be performed from the command line as well. What is the PGP command
line syntax to encrypt the my-message.txt file for a specific user (Sean) and save the output as
secret-message.txt.gpg?
Page 49 of 49
Powered by TCPDF (www.tcpdf.org)