​Using Encryption to Enhance Confidentiality and Integrity
Section 1: Hands-On Demonstration
​Part 1: Create and Exchange Asymmetric Encryption Keys

Make a screen capture showing the fingerprint for your key pair.

Make a screen capture showing the fingerprint for Alice’s key pair.

Make a screen capture showing your public key in Alice’s certificate cache.

Make a screen capture showing Alice’s public key in your certificate cache.
​Part 2: Encrypt a File Using Asymmetric Encryption

Make a screen capture showing the successful signing and encryption message.

Make a screen capture showing the ciphertext.

Part 3: Decrypt a File Using Asymmetric Encryption

Make a screen capture showing the Decrypt/Verify Files window.

Make a screen capture showing the decrypted secret-message.txt file in Notepad.
Section 2: Applied Learning
Part 1: Create an Asymmetric Key Pair

Make a screen capture showing the instructor’s key pair files.
​Part 2: Encrypt a File Using Symmetric Encryption
Document the password you used to symmetrically encrypt the file.

​Make a screen capture showing the ciphertext in the secretmessage_ENCRYPTED.txt file.

Make a screen capture showing the output of the ls command.
Part 3: Transfer and Decrypt a File Using Hybrid Cryptography

Make a screen capture showing the encrypted contents of the secretkey_ENCRYPTED.txt file.

Make a screen capture showing the decrypted contents of the secretkey_DECRYPTED.txt file.

Make a screen capture showing the contents of the secretmessage_DECRYPTED file.
Section 3: Challenge and Analysis
​Part 1: Digitally Sign a Document Using GPG

​Make a screen capture showing the key fingerprint for the key pair you generated in this part of the lab.

​Make a screen capture showing the contents of the unsignedmessage.txt file.
​Part 2: Verify the Digital Signature Using Kleopatra

​Make a screen capture showing the successful signature verification on the signed message file