0% found this document useful (0 votes)
123 views

Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure

Computer Science related assignment "Public key Infrastructure"

Uploaded by

ZaryabRid
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views

Baptiste Lab 7 Encrypting and Decrypting Files With Public Key Infrastructure

Computer Science related assignment "Public key Infrastructure"

Uploaded by

ZaryabRid
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Lab Assignment 7: Encrypting and Decrypting Files with Public Key

Infrastructure

Glenroy Baptiste

Internet/Intranet Security COM-460-

0L01
Section 1: Hands-On Demonstration: Part 1: Create Encryption Keys
Step 11: Make a screen capture showing Nancy’s public key

Glenroy Baptiste

Step 21: Make a screen capture showing Matthew’s public key


Glenroy Baptiste

Section 1: Hands-On Demonstration: Part 2: Encrypt a File


Step 12: Make a screen capture showing the output of the --list-keys command
Glenroy Baptiste
Step 18: Make a screen capture showing the encrypted message

Glenroy Baptiste
Section 1: Hands-On Demonstration: Part 3: Decrypt a File
Step 3: Make a screen capture showing the decrypted message

Glenroy Baptiste

Section 2: Applied Learning: Part 1: Encrypt a File with Symmetric Encryption


Step 10: In the Lab Report file, document the password you used to encrypt the file.
Passw0rd!

Step 14: Make a screen capture showing the output of the ls command
Glenroy Baptiste
Glenroy Baptiste

Step 25: Make a screen capture showing the contents of the decrypted file
Glenroy Baptiste

Section 2: Applied Learning: Part 2: Encrypt a File with Asymmetric Encryption


Step 7: Make a screen capture showing the instructor’s key pair files

Glenroy Baptiste
Step 20: Make a screen capture showing the encrypted contents of the

S2_yourname_newfile_ENCRYPTED.txt file

Glenroy Baptiste

Step 30: Make a screen capture showing the decrypted contents of the

S2_yourname_newfile_DECRYPTED.txt file
Glenroy Baptiste

Section 3: Challenge and Analysis

You are conducting a security investigation of malicious activity that took place on the
TargetLinux01 workstation. As part of your investigation, you would like to send a log file
from the system to your instructor to get advice on interpreting login attempts. The
authentication log is stored in the /var/log/auth.log file.

Log into the TargetLinux01 system using the student account, obtain a copy of the file, and
encrypt it using AES encryption so that only Matthew Hunter can read the file.
Make a screen capture showing the commands used to encrypt and copy the file.

• Create both keys for each user


• Transfer student key to instructor
• Copy file from student terminal
• Encrypt file from student terminal
• Add permission to file from student terminal

• Copy file to instructor terminal


• Decrypt file on instructor terminal
Glenroy Baptiste

Next, copy the file to the instructor account and decrypt it there.

Make a screen capture showing the commands used to copy and decrypt the file.
I’ve encrypt the file, I can see the encrypted file in the /tmp, however I am unable to execute
successful decryption. I am receiving errors which I have not been able to figure out.

Glenroy Baptiste

You might also like