Bailey Johnson

ITS 370

CH 8

 

1.       Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and them go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction?

It is using security certification and 128-bit encryption. When the encryption is larger it is more secure and more complex. Cryptosystems uses cryptographic algorithms needed for encryption and decryption.

2.       Repeat Exercise 1 on a different Web site. Does this site use the same or different protocols? Describe them.

It uses the same size encryption, 128-bits. I don’t see anything different really.

3.       Preform a Web search for “Symantec Desktop Email Encryption (powered by PGP Technology).” Download and install the trial version. Using the tool and your favorite email program, send a PGP-signed email to your instructor. What looks different in this email compared to your other emails?

(I just looked up what was different because my computer guy warned me against downloading trial versions because my laptop is old and might not be able to handle it) The primary difference is the overall encryption layout. You’d normally be able to simply open an email with no issue, save for the standard scan you email provider might do for viruses and spam. Although another big thing is that while the message is not decrypted a user won’t be able to understand what they’re seeing, being that the encryption encases the message in an array of characters that are not decipherable except by the recipient.

4.       Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem.

The AES is a subset of the Rijndael cipher that was established by the National Institute of Standards and Technology in 2001. AES is based on a design principle known as a substitution-permutation network, a combination of both substitution and permutation, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, with a minimum of 128 and a maximum of 256 bits.

AES operates on a 4 × 4 column-major order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are done in a particular finite field.

5.       Search the Web for “steganographic tools.” What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file?

No they look exactly the same. The text really is “covered”.