Preview

Nt1330 Unit 5 Assignment 5

Good Essays
Open Document
Open Document
987 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 5 Assignment 5
Encryption

GBA 685 Advanced Computer Forensics
Report #7
Xianglian Jin

The GNU Privacy Guard (GnuPG) is GNU 's tool for secure communication and data storage. It can be used to encrypt data, create digital signatures, and help authenticating using Secure Shell and to provide a framework for public key cryptography. It includes an advanced key management facility and is compliant with the OpenPGP and S/MIME standards. Gpg4win is GNU Privacy Guard for Windows and Kleopatra is the certificate manager in Gpg4win. To create OpenPGP and X.509 certificates, Gpg4win uses a key length of 2048bit by default. The default algorithm for signing and encrypting is RSA. [1]
In RSA cryptosystem, the encryption key is public and differs from
…show more content…
Then we create a checksum for the decrypted file after decryption to make sure the file has not been altered.
Click ‘File’. Click ‘Create checksum files’. Select the original file and click ‘Open’. Then we got a checksum file which contains the checksum in it.

Figure 14 Create a checksum

Figure 15 Checksum of the original file
Click ‘File’. Then click ‘Decrypt/Verify Files’. Select an encrypted file. Then click ‘open’.

Figure 16 Select an encrypted file
Then click ‘Decrypt/Verify’ to proceed. The procedure also includes entering the passphrase of the certificate.

Figure 17 Decrypt a file
Click ‘OK’ to complete. The decrypted file will appear in the selected folder. Then we create a checksum for the decrypted file follow the steps that have mentioned above.

Figure 18 Checksum of decrypted file
We can see that this checksum is as same as the one of the original file. That means the file has not been altered after encryption and decryption.
4.2 Verification
The first few steps of verification are as same as the decryption. But remember to check the box which says ‘Input file is a detached signature’ before click on the ‘Decrypt/Verity’.

Figure 19 Verify a file

Figure 20 Signature

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment

    • 447 Words
    • 2 Pages

    We cannot complete the construction at this point in time due to the extension of the building project.…

    • 447 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1102 Words
    • 5 Pages

    # Decrypt the password from the file with KMS, save the secret password in LuksClearTextKey…

    • 1102 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    5. Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    If for any reason you are unable to complete your assessments, a return link will be sent to your email address immediately after entering your identification information on the website. You must use the return link on the same computer in order to successfully complete your assessments.…

    • 386 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    key evidence files. You then validated the hash code using EnCase Imager and P2 Commander,…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Q2. What do you notice about the histogram results when text is encrypted with the…

    • 981 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Linux Chapter 2

    • 288 Words
    • 2 Pages

    When you download the SHA1SUMS file, SHA1 is included. This file is useful in determining of the ISO image file that you downloaded was correct. When you use the utility, sha1sum generates a number based on the file. If the number matches the corresponding number in the SHA1SUMS file, the download is correct.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1072 Words
    • 5 Pages

    “Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision.” Although social networking is possible in person, especially in the schools, communities, and work places, it is most popularly done online. This expands the number of one 's business or social contacts by making connections through individuals. This is because on the internet people are more likely to openly connect with others to gather experience with different topics of interest. Some web-based groups are solely establish for promotion on the internet because of its use being so common. Even though social networking has become very popular over the years most users don’t know what they’re getting into when they sign in and answer basic profile questions. But it’s easier to understand if you see that starting up in social networking is almost like moving to a new school, you start out with no friends but as you start joining groups and meeting new people you begin associating with people that share similar interests and soon enough your friends list…

    • 1072 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Customer Service Level 2

    • 1009 Words
    • 5 Pages

    The first thing you need to do is save a copy of this document, either onto your computer or a USB drive…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The first thing you need to do is save a copy of this document, either onto your computer or a disk…

    • 1315 Words
    • 6 Pages
    Good Essays