Cryptographic tools are used to generate and confirm the integrity of information or data and can be used for confidentially to protect from the unauthorized viewing of materials.
This greatly assists with the security of information you are receiving from the source location. Further with hashing, you can confirm, for example, a program you have downloaded has not been modified in some manner by checking its hash value produced by the author with your own value.
In this exercise, you will learn the following:
CryptoDemo Installation
CryptoDemo Encryption
CryptoDemo Decryption
Key Values
Hashing
Please refer to your course material or use your favorite search engine to research this topic in more detail.
Task 1 - CryptoDemo Installation
Here we will install the tool and prepare to use it to learn more about cryptographic basics.
Step 1
Ensure you have powered the required devices indicated in the introduction, then connect to PLABWIN10.
The desktop is displayed.
Step 2
Open Internet Explorer; the default homepage is the Practice Labs Intranet.
Go to Tools, then to the Hacking Tools folder.
At the beginning of the Hacking Tools page, you will find the zipped program.
Save CrytoDemo.zip to the Downloads Folder.
Step 3
Navigate to the Downloads folder.
Right-click on the zipped document and click the Extract All option from the list and click the extract button.
Step 4
Double-click the extracted folder and view the contents as below.
Navigate to the setup file and double-click the Setup file.
Note: You might get a User Account Control warning. Press Yes and continue with the installation.
Step 5
Click the computer button icon to begin the install.
Click Continue on each further stage to complete the installation.
Step 6
Close all the explorer windows and click on the Windows 10 Start Icon.
Then navigate to the Cryptography Demonstration and click on the CrytoDemo1.0 program to start.
Above we can see the program in the start menu, and below we can see the same program once it has been opened.
Now we are ready to continue with the next task.
Task 2 - CryptoDemo Encryption
We will now apply the encryption algorithm 3DES to see the output and begin to recognize what such an output generates in terms of values. This, in fact, helps experienced persons recognize different algorithms just on sight.
Step 1
Take a moment to study the interface; this program is designed to assist in practicing and learning more about Encryption.
Expand the drop down menu for the Encryption Algorithm and choose Triple DES Encryption (3DES).
Step 2
On the section below you can enter a key of your own choice or use the following key.
Type the following into the field:
Practice-Labs.com
Step 3
Now we will enter some text into the Data field to be encrypted.
Welcome to Practice Labs, we hope you are really enjoying the course!!
Now click the Encrypt button to see the result of the encryption and a result will be displayed in the Encrypted Data field.
You can click the Encrypt button as many time as you like and you will see different results of output data; this is one of the most important conceptions behind encrypting a text. The cipher text should be different and unreadable.
Task 3 - CryptoDemo Decryption
Now we must move on to decrypting the content and making sure, it has the same content as originally intended.
Step 1
Now be careful, delete only the Data field containing the written text you entered and don’t change the Key or the Algorithm type.
Click the Decrypt button to see the result back in the Data field.
You will have the same original text decrypted from the data.
You can now try the other algorithm types of DES, RC2, RC4 to see the output from these.
Step 2
Try deleting a single character or more from the Encrypted Data. Here the last = signed was deleted presenting the following image.
You should get something similar as the program was unable to decode the encrypted data. This is a positive result.
Task 4 - Key Values
In general, mixing up as many variables as possible with long string lengths produces a strong key to encrypt or hash against, however here we will use options presented of Random Key and Time Key.
We will now apply these key formats to see the results.
Step 1
Previously we input our own however, in reality, this is a poorly secured key and a better option would be to generate a random or time value key which is a lot more secure.
Delete the contents of the Encrypted Data.
Let’s try the Random Key button to see what key you are presented with.
Note: It’s random so your key should not match the images, neither will your time values
Again click the Encrypt button to see the cipher text generated using this type of key.
From the image above we can see a very different result using this key value.
Step 2
Now delete the Encrypted data again and click the Time Key button.
Again let’s click the Encrypt button and see the values generated.
Once more we see another output which differs from the first result.
Task 5 - Hashing
Hashing a value is used to map data of any size and provide a method for verifying the integrity and also the authenticity of data and their authors.
Here we will apply the same tool to see hash results.
Step 1
Click on the Hashing tab on the top, and you will see the Hash Algorithm has been set to MD5 which is a very common hash type.
Step 2
Within the top field, write the following:
Congratulations, you are learning how hashing works!
Unlike the encryption stage before, this hash will not change if you click the button.
Get Hash
Step 3
From the drop down menu of the Hash Algorithm, click on one of the other types such as SHA1 and then click the button.
Get Hash
You will now see a different result for each algorithm.
Leave the devices you have powered on in their current state and proceed to the next exercise.
Comments
Post a Comment