1. Go to a popular online e-commerce site like Amazon.com Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction? The information appears hidden. The input type also appears hidden on the code to make sure you can’t guess what data type they are. The visibility is also hidden to make sure you can’t find specific information on each of the payment options that are on there.
2. Repeat Exercise 1 on a different Web site. Does this site use the same or different protocols? Describe them. Newegg the site I used, provided a valid certificate. It was a valid trusted server certificate issued by Symantec class 3. It also had a secure connection using TLS 1.2. Also, all resources used on the page were served securely. All the data was hidden, and no data types were visible when examining the code of the site.
3. Perform a Web search for “Symantec Desktop Email Encryption (powered by PGP Technology).” Download and install the trial version. Using the tool and your favorite e-mail programs, send a PGP-signed e-mail to your instructor. What looks different in this e-mail compared with your other e-mails?
4. Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem. It is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology. It is a subset of the Rijndael cipher. The algorithm in the AES is asymmetric-key algorithm which uses the same key for both encrypting and decrypting the data. It became a federal government standard in 2002 after approval by the Secretary of Commerce.
5. Search the Web for “steganographic tools.” What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file? It is a software tool that allows a user to embed hidden data inside a carrier file, such as an image or video and later extract that data. Comparing the data side by side I could not tell the difference between the two files. The program I used allowed me to also make a watermark of the file to see if any changes were made to the hidden data.