In this work, you are going to use the program

In this work, you are going to use the program openssl to encrypt, decrypt, and hash some values. We are going to use real algorithms that are used in modern communications.

At a command prompt, type “openssl ciphers” to see the ciphers that are available with this installation of openssl.

First, we will attempt to encrypt and then decrypt a string. After the first command, you’ll need to enter a password that will derive your encryption key.

  • echo “CIS3100” | openssl enc -aes-256-cbc -a 
  • echo <previous output> | openssl enc -aes-256-cbc -a -d 

You should have returned “CIS3100” (our original plaintext) at this point. To break down further what’s happening, the echo command is used to provide text input to openssl. Then, we call the program openssl; “enc” says we are using the encryption/decryption module; “-a” is encoding the data in base64; and “-d” is specifying that this will be a decryption operation.  

Now, let’s try hashing a password: 

  • openssl passwd -salt “salt” “password” 

In this example, the returned result will be your hash of a password. The hash will be the same for each time you run this with the same parameters. However, it is not easily reversible. To break down further what’s happening, “-salt” is specifying a value to be a salt, an additional piece of data to add complexity to your hash and make it harder for someone to brute force your list of hashes; “password” (in this case) is your secret password value.  

Now, for your submission, you’ll be encrypting, decrypting, or hashing the following values and submitting those based on the parameters given. Remember that capitalization matters, and be careful to remove any line breaks in the output when you copy and paste.  

  1. Encrypt “CIS3100” using the password “password” and the algorithm “aes-128-cbc”.
  2. Decrypt “U2FsdGVkX18O3AUltiVEAyBDcfesmyojn8pU6zXWUu8x4LHsrV3Q+BWRR2wjC3Xl” using the password “password” and the algorithm “aes-128-cbc”.
  3. Hash the password “MySecret” using the salt “pepper”.
  4. Decrypt “U2FsdGVkX18idu4Cp/KbOanB726etAlbcmI/yeihAoh01Md5EOkb8Ld/
    Dk88CDManZKZ4FH8ruo7THx5boOOXz9LkMiqh47Dc2kA8omOcGwjJo
    tuHyq54rlq17bV9srO025vbZ+jRRHrwbd+iNQaMQ==” using the
    password “password1” and algorithm “aes-256-cbc” and then decrypt
    that result using the password “password2” and algorithm “aes-256-cbc”.

Parameters

  • The work should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Topic 3 DQ 2 A good analysis of the articles.When

 Topic 3 DQ 2 A good analysis of the articles.When examining an article for use as evidence, questions such as the method used in the study itself, its corrections, and the need for evidence can be important. It is important to use only articles that use the right method (Pyrczak

“Why’s This So Good? David Foster Wallace and the Brilliant ‘Consider

For this assignment, you will write a persuasive, thesis-driven, well-supported, and analytical essay that rhetorically analyzes the effectiveness of one of the Barbara Holland essays we read this quarter (except for “Plans” or “Coffee”). As you consider how Holland is effective in the essay you choose to analyze, make sure

Information Systems in Government Agency or Corporation

Government agencies and corporations have similar information need. Google and pick a government agency or corporation. Make sure no other student has picked the corporation you picked. So check the Discussion Board in Canvas before you pick your corporation. So the sooner you post, the better. Identify and briefly discuss

In the relational database context, it is necessary to define

In the relational database context, it is necessary to define authorizations that provide access to portions of the original relations. Select one:a.Access patternsb.User-based restrictionsc.View-based access controld.Both B and C Both S x and S y send their relations to S Q, which computes the join result. Select one:a.Peer-joinb.Broker-joinc.Split-join d.Semi-join What

Overview Using the SEC 10-K for your company, answer the

 Overview Using the SEC 10-K for your company, answer the following questions. Do not cut and paste from your company SEC report. Notice line items, if they appear, for Right of Use Assets and Lease Liabilities as well as other changes in Property, Plant and Equipment (PPE) and Liabilities. Long

Topic: Literature Review Resources Successful completion of a doctoral dissertation

Topic: Literature Review Resources Successful completion of a doctoral dissertation requires significant amounts of independent reading on the research topic. This allows the doctoral learner/researcher to become familiar with the scope of the topic and to identify gaps or tensions within the existing literature on the topic. These gaps and

The Bitter Struggle

Essay #1: Late-19th-Century American Literature & Reader Expectations In the following essay, consider how the three authors (Cahan “A Ghetto Wedding”, Crane “The Open Boat”, and Chestnutt “The Grandison”) covered thus far in class create a narrative and thematic structure that challenges expectations. That is, trace how specifics in each

Identify a REIT, REIT ETF or Real-estate related public company of

This project consist of a written report about an investment of your choice. It is actually more valuable for you as a case study that may help you in your career. You will have to identify a REIT, REIT ETF or Real-estate related public company of your choice. Your chosen

Towards zero carbon: achieving 100% renewable energy power generation

Propose how, using renewable energy technology, the UK might realistically move to a ‘zero carbon’ economy by 2040. i) Firstly, determine the current UK non-renewable energy consumption (e.g. gas, oil, coal) used for industrial and domestic heating and transport and some of our electrical generation and their carbon emissions. ii)

Need a formal Outline Proposal created for a group of

Need a formal Outline Proposal created for a group of 4 people working together -Identify the legal issue we are working on  -What current event in detail we are dealing with  -Who is doing what part of the research on the topic – Need to ensure we have 4 sub

Do you think it’s possible to live a colorblind life?

  Do you think it’s possible to live a colorblind life?  That is, a life in which you are ignoring any and all racist ideas?  Why or why not?  Research and discuss in detail three reasons why or why not?  Please defend your argument with scholarly, peer-review sources.  Please explain

PICOT question: In patients diagnosed with a panic disorder, how does

PICOT question: In patients diagnosed with a panic disorder, how does a combined therapy of SSRIs and cognitive behavioral therapy compare to SSRIs alone with patient satisfaction in treatment of panic disorders over a span of 9 months? For this assignment, you will locate a minimum of 4 research articles

BUS 472 Project Control using Excel Worksheet Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor responsible for creating college assignments and evaluating student performance, I strive to provide comprehensive education and support to medical college students. With a strong background in medical education, I design lectures, assignments, examinations, and feedback mechanisms that not only assess students’ knowledge

Around 3500 BCE, what your text calls “complex societies” began

 Around 3500 BCE, what your text calls “complex societies” began to form in the Fertile Crescent of present-day Iraq and along the banks of the Nile in Egypt. These two societies—Mesopotamia and Egypt—developed along parallel lines in many ways, but they also encountered challenges and benefits unique to their situations.

Explain how the nurse leader who conducts an external analysis

Explain how the nurse leader who conducts an external analysis of competitors lays the groundwork for internal organizational analysis and development of a competitive advantage. Expectations Initial Post: Due: Thursday, 11:59 pm PT Length: A minimum of 250 words, not including references Citations: At least one high-level scholarly reference in

Wk 4 health assessment teaching tool project 1

To create a Patient Teaching Plan aimed at educating a specific patient population about a specific health topic. This plan will be used to develop a Visual Teaching Tool in a future assignment. Course Outcomes This assignment enables the student to meet the following course outcomes. • CO 2: Recognize

Using the SEC 10-K for your company, answer the following

  Using the SEC 10-K for your company, answer the following questions. Do not cut and paste from your company SEC report. Notice line items, if they appear, for Right of Use Assets and Lease Liabilities as well as other changes in Property, Plant and Equipment (PPE) and Liabilities. Long