Cryptography

Note: this was converted from PDF to Markdown using pdftotext and manual formatting. The original PDF can be found here along with the bibliography. Cryptography Laboratory Protocol Exercise 3: Cryptography Figure: Wunderbares Gruppenbild Subject: ITSI|ZIVK Class: 3AHITN Name: Stefan Fürst, Marcel Raichle Group Name/Number: Dumm und Dümmer/7 Supervisor: ZIVK Exercise dates: 4.10.2024, 11.10.2024, 18.10.2024 Submission date: 7.6.2024 Table of Contents Task Definition Summary Symmetric Encryption Asymmetric Encryption Integrity Check Exercise Execution Symmetric Encryption Calculate Password for Symmetric Encryption Encrypt File Symmetrically with AES256 Asymmetric Encryption Check Integrity References List of Figures Task Definition First, we deal with symmetric encryption, where a file is encrypted with a calculated password and then decrypted again. The same password is used for both encryption and decryption to verify and validate the process. ...

October 18, 2024 · 3 min · veya