Q. #1: What is a Hash function? What is its main usage in information security? Perform the following practical task: 1. Go to https://emn178.github.io/online-tools/sha256.html. 2. Enter your full...

1 answer below »
Q. #1: What is a Hash function? What is its main usage in information security? Perform the following practical task: 1. Go to https://emn178.github.io/online-tools/sha256.html. 2. Enter your full name as input, calculate its SHA256 hash, and share the result. 3. Append a dot (.) to your name, calculate its SHA256 hash, and share your result. 4. Do they match? 5. Remove the dot (.), is the hash value same as before? (5 Marks) Q. #2: What is the difference between symmetric and asymmetric cryptography? Perform the following practical task: 1. Pair up with one of your class-mates for this exercise. (If not feasible, get the help from any other friend). Exchange email addresses with your partners. 2. Go to https://www.devglan.com/online-tools/rsa-encryption-decryption. 3. Each student must generate their RSA public and private key pair by using the above link. Email your public key to your partner. (Attach the screenshot of the email that you sent). 4. Copy and paste your private key here in you answer. (Do not share it with your partner) 5. Use your partner’s public key to encrypt a message that must include your name in it. (Hint: Use the left column of the webpage for encryption, and use public key of your friend). The message must not be inappropriate. Example: “I am David and I love to play squash” 6. Email the encrypted message to your partner. Your partner will do the same and will send you an encrypted message. Share the screenshots. 7. Decrypt the encrypted text sent by your partners using the same link. (Hint: Use the right column of the webpage for decryption, and use your private key). Share the screenshot. 8. Were you able to recover the cyphertext? Email the plaintext (recovered text) to your friend. (5 Marks) Q. #3: Write the process of generating Digital Signatures in your own words? Create a flow chart of the process using pen and paper, take its photo and attach. (5 Marks) BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Q. #4: What are Digital Certificates and what is their usage? What weakness in Digital signatures led towards Digital Certificates? (5 Marks) Q. #5: Go to page 187 of your e-textbook*, complete the task Case Project 4-4: HTTPS and submit your response. (10 Marks)
Answered Same DayDec 08, 2021

Answer To: Q. #1: What is a Hash function? What is its main usage in information security? Perform the...

Sandeep Kumar answered on Dec 12 2021
142 Votes
1.1. A hash function is a type of function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are known as hash values.
2. 863498dfa3f35f634f532b3cab89b0f8b6baaf9a2a94722c52ca2ef44377efc2
3. 6c89f6da53f15c27577d3fe1dfbd39d8737608b10aa3b80b1b4a7d19b960aa57
4. They don’t match
5. Yes, it’s the same as before. (no-collision)
2. 1. Public (sent to the friend’s email Id) - MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDU5hGGVgsQd1NUibNnu+upo7rkhL0jkJC7iPu+9Ijj9oUOKoZSqxfKJRTXEI5Pm50VOWRv+l+ReeIJ84ytQsYfCXB+BrK8EiiPygziL/4PTNX50QPEw/PTr++tENdJy8vl0Ix6Ah0hwPX+XSQ+/8+MBfujgGtPFr9K5vjERvm2oQIDAQAB
Private...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here