You are on page 1of 11

COURSE: Data & Network Security TOPIC: Cryptographic Tools CODE: BCN2023

MARKS:

ASSESSMENT: Lab Sheet

/
20

NO: 1

DURATION: 2 hours

Lab Objectives:
Through this lab sheet, student will have the ability to: 1. Study the cryptographic tools. 2. Learn cryptography concept and application. 3. Investigate some common attacks and analysis for cryptography.

Instructions:
1. This work should do individually. 2. Report must be submitted based on tasks given below. The report must have print screen explanation (8 marks), your own analysis and finding (8 marks) and reflection of these lab sheet objectives (4 marks). 3. The assignment must be submitted in a format as follows: a. Font : Century Gothic b. Size : 10 c. Line Spacing : 1.15 lines d. File naming(caps lock) :<BCN2023_LAB1_matrixnum> e.g BCN2023_LAB1_CA02057 4. Report submission: Monday (15/10/12) before 11.55 pm through moodle.

Tasks:

(A)
1. Install CrypTool (SetupCrypTool_1_4_30_en.exe).Download it from this site (http://www.cryptool.org/en/ct1-download-en) 2. The application CrypTool is a comprehensive educational program about cryptography and cryptanalysis. You can use it to apply and analyze cryptographic algorithms. 3. Apply and Use this tool to learn cryptography concept for : a. Classic Crypto (Caesar, Playfair ,Vigenere and Permutation/transposition cipher) b. DES c. Triple DES

(B)
1. Search on net other cryptographic tools available and their features. Features may be in terms of size, speed, different algorithms, etc. 2. Do findings on the tool and compares it with the given tool in task A; CrypTool.

End of Lab Sheet 1


1. Classic Crypto A) Caesar

Processes: Shift->10 A F K P U Z K P U Z E J M=W O=Y H=R D=N F=P A=K D=N H=R I=S L=V L Q V A F M R W B G N S X C H O T Y D I B G L Q V C H M R W D I N S X E J O T Y

B) Play fair

The sentence must be separate to alphabet. Play fair Key=UMP

U C H O V

M D I/J Q W

P E K R X

A F L S Y

B G N T Z

U C H O

M D I/J Q

MO=UQ

C H

D I/J

HD=IC

A F L

FA=FL

C H

D I/J

DH=CI
I/J K L N

IL=KN

C) Vigenere

Encription Key=UMP
M U G O M A H P W D U X F M R A P P D U X H M T I P X L U F

D) Permutation/Transposition cipher

M=3 Key=UMP (3, 1, 2) inverse (2, 3, 1)

F 3

A D Encryption 1 2

H 3

I 1

L 2

A 2

D F Decryption 3 1

I 2

L 3

H 1

B) DES Key =Shift 4 Plaintext:

FADHIL Encryption Shift 4 JEHLMP Decryption Shift 4 FADHIL

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

F=J A=E D=H H=L I=M L=P

C) 3 DES For Sender: Plaintext:

FADHIL

Shift 4 Encryption JEHLMP Shift 3 Decryption GBEIJM Shift 2 Encryption Data sent IDGKLO

For Receiver:

IDGKLO Shift 2 Decryption GBEIJM Shift 3 Encryption JEHLMP Shift 4 Decryption

FADHIL

(B)
1. Search on net other cryptographic tools available and their features. Features may be in terms of size, speed, different algorithms, etc. 2. Do findings on the tool and compares it with the given tool in task A; CrypTool. Name Cryptographic Tool
1) GNU Privacy Guard

Size

Speed

Algorithm

Other

1.4 MB

Longer.

2)

Disk Utility

47 KB

Longer.

3)

TrueCrypt

3.31 MB

Faster.

Using asymmetric keypairs individually generated by GnuPG users. Triple DES. To verify the file structure of the current boot drive. Using on-the-fly encryption (OTFE). It can create a virtual

For Windows /Mac/Linux. Free.

For Mac OS only. Free. For Windows/ Mac/Linux.

encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Window s 2000) the entire storage device (pre-boot authentication). 4) 7-zip 1.09M B. 3.25M B. Faster.
Strong AES-256 encryption in 7z and ZIP formats

Free.

5)

AxCrypt

Faster.

Password Protect any number of file using strong encryption.

For Windows only. Free. For Windows only. Free.

Name Cryptograp hic Tool CrypTool

Size

Speed

Algorithm

Other

36MB.

Faster.

Classical For ciphers are Windows available only. Free. alongside asymmetric cryptography including RSA, elliptic curve cryptography , digital signatures and DiffieHellman key exchange.

AxCrypt

3.25MB.

Faster.

Password Protect any number of file using strong encryption.

For Windows only. Free.

You might also like