Nt2580 Lab 4

1272 Words6 Pages
CIT 251 – Computer Security Overview, Fall 2013 Lab #4: Encryption Your name: Katie McGuire Announcements: 1. Please find a team mate, but submit your own report although you need to work with a partner to run the public key encryption lab. 2. Submit the TWO soft copies at the end of the class: one for regular Word document, one for encrypted Word file (see instructions). 3. The purpose of this lab is to be familiar with encryption methods, both public key encryption and private key encryption. For private key encryption, we will use a tool called NeoCrypt, which allows run several different private key encryption algorithms. For public key encryption, we will use the open source PGP which is under GNU license, called Gnu PGP (or GPG). GPG…show more content…
Copy and paste your public key below. [Exercise III: Public key encryption] If you encrypt a file using your classmate’s public key, the file and the public key file can be sent over public Internet and your classmate can decrypt the file using their own private key without anyone knows their private key. 1. Partner with one of your classmates. Exchange your public key file (YourLastName_public.asc) with your partner through an email or a thumb drive. 2. Import your partner’s public key into your keyring editor and Sign the public key that you have just imported. a. Right click on the public key file that your partner sent you b. Click on More GpgEx Options and Import keys. 3. Encrypt a file using your partner’s public key and ask your partner to encrypt a file using your public key. Exchange the encrypted files. a. Right click on the file to be encrypted. b. Click on More GpgEx Options and

More about Nt2580 Lab 4

Open Document