Objective: The objective of this assignment is to explore Information Security and Assurance (IS&A)concept and application using Cryptography. Through this assignment, you are required to do secondary...

1 answer below »

Objective:


The objective of this assignment is to explore Information Security and Assurance (IS&A)concept and application using Cryptography. Through this assignment, you are required to do secondary research in addressing some of the challenges you will encounter. The final submission must be in a report format (as per the sample posted on blackboard).


Deliverables: A single report document answering all listed questions or with results of activities. The final document must meet the submission requirements at the end of this document.


Part A: Cryptography (100 Marks)




  1. Search the Web for “steganographic tools.” What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file? [25 Marks]




  2. Generating and Comparing Hashes [35 Marks]




    1. In this activity, you will download and compare the results of various hashes.




    2. Go to the web site http://implbits.com/products/hashtab/ and download Hash Tab for


      Personal use (Free) (latest version) for windows.




    3. Install the tool.




    4. Create a document (using a text editor such a notepad or Word document etc. Please note


      that notepad is install be default on all the virtual machine used in Assignment 1 and 2). Write some sample text inside (e.g. “Now is the time for all good men and women to






come to the aid of their country.”). Save the file in a convenient folder and with an appropriate name (e.g. country1.txt). Close the file.




  1. Create another file with almost similar content, but not exactly same, e.g. leaving the last period in the text above, and save it (e.g. as country2.txt). Close the file.




  2. Now in the folder where the word file is saved, right click on the file name to see the properties of the file. You’ll see a new tab, File Hashes.




  3. Click this tab to see the hashes for this file.




  4. Click on Settings. Click the “Select None” , click on OK




  5. Click on Settings, select SHA-1. click OK.






  1. Scroll through the different hash values generated. Click “Compare a file”.




  2. Navigate to the file country2.docx and then click OK.




  3. A hash is generated on this file. Give your detailed observation and screenshots about the result comparison and the tool in general




3. Based on course content and other materials complete the following Asymmetric Cryptography questions(Tip: Refer the lecture slides for this week). [40 Marks]
















































Action



Whose key to use



Which key to use (Public or Private)



Explain



Peter wants to send Susan an encrypted message






private)






Susan wants to read an encrypted message sent by Peter












Peter wants to send a copy to himself of the encrypted message that he sent to Susan












Peter receive an encrypted reply message from Susan












Peter wants to send Susan a message with digital signature












Susan wants to see Peter’s digital signature











Answered 3 days AfterApr 14, 2021

Answer To: Objective: The objective of this assignment is to explore Information Security and Assurance...

Ali Asgar answered on Apr 18 2021
136 Votes
Assignment report on Steganography and cryptography
(
Achyut
ID Number
 

Assignment report on Steganography and cryptography
)
Table of
Contents
Steganography and Cryptography    2
Objective    2
Devices and Softwares used    2
Task 1    2
Searching the Web for Steganographic tools:    2
Downloading and Installing one of the software:    2
Task 2    5
Download and install the HashTab software    5
Task 3    8
Asymmetric Cryptography Questions    8
Steganography and Cryptography
Objective
The objective of this assignment report is to learn about steganography and cryptography. Gather information about various steganographic tools available on the web and install and use one of them. Also find and install the HashTab tool that shows various hash of any file.
Devices and Softwares used
We require the following devices and softwares for this assignment:
1. Windows PC for installing and analysing the various steganographic and cryptographic tools.
2. OpenStego Software (a free software) is a steganographic tool used to hide a text file in an Image file.
3. HashTab Software (free personal edition) to check the various type of hashes of any files.
Task 1
Searching the Web for Steganographic tools:
Upon doing a simple google search with keywords Steganographic tools, we find a few information security blog sites explaining what is steganography and containing list of some popular steganographic tools. Most tools hide a text file inside an image or a music file.
Downloading and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here