top of page

​Using Encryption to Enhance Confidentiality and Integrity 

Section 1: Hands-On Demonstration

​Part 1: Create and Exchange Asymmetric Encryption Keys

Screenshot_20.png

Make a screen capture showing the fingerprint for your key pair.

Screenshot_21.png

Make a screen capture showing the fingerprint for Alice’s key pair.

Screenshot_22.png

Make a screen capture showing your public key in Alice’s certificate cache.

Screenshot_23.png

Make a screen capture showing Alice’s public key in your certificate cache.

​Part 2: Encrypt a File Using Asymmetric Encryption

Screenshot_24.png

Make a screen capture showing the successful signing and encryption message.

Screenshot_25.png

  Make a screen capture showing the ciphertext.

Screenshot_26.png

Part 3: Decrypt a File Using Asymmetric Encryption

Screenshot_28.png

Make a screen capture showing the Decrypt/Verify Files window.

Screenshot_29.png

Make a screen capture showing the decrypted secret-message.txt file in Notepad.

Section 2: Applied Learning

Part 1: Create an Asymmetric Key Pair

Screenshot_30.png

Make a screen capture showing the instructor’s key pair files.

​Part 2: Encrypt a File Using Symmetric Encryption

Document the password you used to symmetrically encrypt the file.

Screenshot_30.png

​Make a screen capture showing the ciphertext in the secretmessage_ENCRYPTED.txt file.

Screenshot_32.png

Make a screen capture showing the output of the ls command.

Part 3: Transfer and Decrypt a File Using Hybrid Cryptography

Screenshot_33.png

Make a screen capture showing the encrypted contents of the secretkey_ENCRYPTED.txt file.

Screenshot_34.png

Make a screen capture showing the decrypted contents of the secretkey_DECRYPTED.txt file.

Screenshot_35.png

Make a screen capture showing the contents of the secretmessage_DECRYPTED file.

Section 3: Challenge and Analysis

​Part 1: Digitally Sign a Document Using GPG

Screenshot_36.png

​Make a screen capture showing the key fingerprint for the key pair you generated in this part of the lab.

Screenshot_37.png

​Make a screen capture showing the contents of the unsignedmessage.txt file.

​Part 2: Verify the Digital Signature Using Kleopatra

Screenshot_38.png

​Make a screen capture showing the successful signature verification on the signed message file

bottom of page