In this work, you are going to use the program

In this work, you are going to use the program openssl to encrypt, decrypt, and hash some values. We are going to use real algorithms that are used in modern communications.

At a command prompt, type “openssl ciphers” to see the ciphers that are available with this installation of openssl.

First, we will attempt to encrypt and then decrypt a string. After the first command, you’ll need to enter a password that will derive your encryption key.

  • echo “CIS3100” | openssl enc -aes-256-cbc -a 
  • echo <previous output> | openssl enc -aes-256-cbc -a -d 

You should have returned “CIS3100” (our original plaintext) at this point. To break down further what’s happening, the echo command is used to provide text input to openssl. Then, we call the program openssl; “enc” says we are using the encryption/decryption module; “-a” is encoding the data in base64; and “-d” is specifying that this will be a decryption operation.  

Now, let’s try hashing a password: 

  • openssl passwd -salt “salt” “password” 

In this example, the returned result will be your hash of a password. The hash will be the same for each time you run this with the same parameters. However, it is not easily reversible. To break down further what’s happening, “-salt” is specifying a value to be a salt, an additional piece of data to add complexity to your hash and make it harder for someone to brute force your list of hashes; “password” (in this case) is your secret password value.  

Now, for your submission, you’ll be encrypting, decrypting, or hashing the following values and submitting those based on the parameters given. Remember that capitalization matters, and be careful to remove any line breaks in the output when you copy and paste.  

  1. Encrypt “CIS3100” using the password “password” and the algorithm “aes-128-cbc”.
  2. Decrypt “U2FsdGVkX18O3AUltiVEAyBDcfesmyojn8pU6zXWUu8x4LHsrV3Q+BWRR2wjC3Xl” using the password “password” and the algorithm “aes-128-cbc”.
  3. Hash the password “MySecret” using the salt “pepper”.
  4. Decrypt “U2FsdGVkX18idu4Cp/KbOanB726etAlbcmI/yeihAoh01Md5EOkb8Ld/
    Dk88CDManZKZ4FH8ruo7THx5boOOXz9LkMiqh47Dc2kA8omOcGwjJo
    tuHyq54rlq17bV9srO025vbZ+jRRHrwbd+iNQaMQ==” using the
    password “password1” and algorithm “aes-256-cbc” and then decrypt
    that result using the password “password2” and algorithm “aes-256-cbc”.

Parameters

  • The work should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

I have provided the project details below. Attached file, Please

I have provided the project details below. Attached file, Please make sure to go through it first well. The project is about the wedding. Everything is mention below. Skeleton Draft: Make sure to go through the Skeleton Draft format. in google,e. The two mention below are the : Make sure

Project Plan / Gantt Chart / Budget section of deliverables

Project Plan / Gantt Chart / Budget section of deliverables this week.   From a budget perspective you need to include resource costs (mostly yours although you can identify other people that might be needed to complete the project), potential hardware costs (i.e., the actual hardware, set up costs, ongoing costs),

Please provide a follow-up question to your discussion post attached

Please provide a follow-up question to your discussion post attached and then your answer/explanation to that question. This post should be at least 150-200 words long and include at least one quote or specific reference to a concept or vocabulary from the Learning Materials with a citation in MLA format, which

A project’s Work Breakdown Structure (WBS) and Gantt chart provide

   A project’s Work Breakdown Structure (WBS) and Gantt chart provide structure for a project. In this week you develop both the WBS and Gantt chart for a fictitious organization. The Manage Your Health, Inc (MYH) scenario will be used in the weekly assignments for the rest of the course.

Instructions In order to complete assignment #5 you will need

Instructions In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings,

Need PowerPoint Slides Unit 6: Country Analysis Presentation – Cote

   Need PowerPoint Slides Unit 6: Country Analysis Presentation – Cote d’Ivoire Introduction Communicating findings and issues through presentations is an integral part of business. Collate your research from the country analysis application assignment into a group presentation. Elect a project manager, who will submit the presentation on behalf of

The article “Is It Important to Examine Crime Trends at

The article “Is It Important to Examine Crime Trends at a Local ‘Micro’ Level?: A Longitudinal Analysis of Street to Street Variability in Crime Trajectories” discusses the impact of criminal proceedings on crime victims as secondary victimization (Groff, Weisburd, & Yang, 2010). After reflecting on the article, choose two criminological

Please respond to the following. Q1) What does it mean

   Please respond to the following.  Q1) What does it mean to think effectually? Q2) How is it different from thinking causally? Q3) When is it important for an entrepreneur to think effectually? Provide an example of your own effectual thinking. 250 to 400 word  supported with a minimum of

Explain how the patient moved through the healthcare delivery system.

Explain how the patient moved through the healthcare delivery system. With respect to the costs you calculated last week, describe how the patient will pay for the cost of treatment. Analyze the healthcare delivery system as illustrated in this case. What problems did you notice? Would some people find it

Introduction The introduction clearly and concisely states the purpose in

Introduction The introduction clearly and concisely states the purpose in a single sentence that is engaging and thought-provoking. The introduction clearly states the main topic and previews the structure and content. Summarize the history of the emerging technology. Search “history of your topic.” How did it start?  What are the

Need a 200 word abstract regarding the following topic Child

Need a 200 word abstract regarding the following topic Child Welfare: An analysis of the instability within the NYC foster care system  Consider the ways in which the history of settler colonialist society, its ideologies, beliefs, values, language and ways of knowing, shape the manner in which social work is

1 page Make sure you’ve read Nathaniel Hawthorne’s “Young Goodman

 1 page Make sure you’ve read Nathaniel Hawthorne’s “Young Goodman Brown” and “The Minister’s Black Veil” before posting. 1) Read “The Minister’s Black Veil” and “Young Goodman Brown” before posting.2) then answer below questions The ending of “Young Goodman Brown” is certainly disturbing. Brown becomes an angry recluse, unable to set

THIS IS A CONTINUATION ASSIGNMENT FROM THE LAST ONE YOU

THIS IS A CONTINUATION ASSIGNMENT FROM THE LAST ONE YOU DID. DISCUSSION 1 Do the attach assignment HIS 100 Module Two Activity Template. Specifically, you must address the following rubric criteria: Write a clear, relevant, and focused research question about the topic you have selected. Refer to the module overview

Project Plan Draft of the Introduction and Project Plan from

  Project Plan Draft of the Introduction and Project Plan from Chapter 3 of the Capstone Project. Remember to identify where you meet the Programmatic Outcomes (PDF) by placing them on your POID Table. This assignment will not carry a grade but needs to be turned in for feedback prior to

Yellowtail Marine

 Global Leadership Roles and Strategy This topic provides an opportunity to start developing an appreciation for the role of the general manager. In particular, we will emphasize the unique characteristics and challenges faced by general managers, as well as the variety of roles that they typically play. In doing so

Apply all that you’ve learned in critical thinking and writing  this semester. It is a “real world” application asking you to read a

Apply all that you’ve learned in critical thinking and writing  this semester. It is a “real world” application asking you to read a couple contemporary articles and then to compose a rational  and evidence-based argument, taking ONLY these articles as your source evidence. You will be evaluated on the rationality of your argument, your use of