Abiodunakadiri
5 min readNov 29, 2023

Talk about the Asymmetric cryptography. — Answer Slide 2 with a storyline of file transfer between Alice and Bob. — Also show the workings of the assignments on Slide 3 and 4 on the medium site. — Be as detailed as possible. — Submit the link to Google classroom ASSIGNMENT — III Alice wants to maintain confidentiality of a file she want to send to Bob She encrypts it with her private key and sends it to Bob Question: Did she achieve her objective? If not, what did she achieve? — 5 marks Bob receives the files (encrypted with Alice’s Private key) What should he do to verify that the files can only be from Alice. — 5 marks If I want to securely distribute a secret password to everyone in the class How can I achieve that using asymmetric cryptography? (not more than 6 steps) — 7 marks ALL SUBMITTED SCREENSHOTS MUST SHOW YOUR SYSTEM TIME ASSIGNMENT — III — SYMMETRIC CRYPTOGRAPHY Download and extract OpenSSL from here — https://indy.fulgan.com/SSL/ A file has been encrypted and uploaded to https://raw.githubusercontent.com/py7hagoras/blacktech/main/Wonderful.enc Save the contents (CTRL+S)– don’t copy and paste the contents, make sure to save using CRTL+S or clicking “save” in your browser This file (Wonderful.enc) will also be uploaded to the Whatsapp group in case the previous step is difficult. Using techniques shown in class with openssl, decrypt the file with the unquoted password “blacktech” (ignore quotes). Use the “aes-256-cbc” option for the decryption. Submit the SCREENSHOT of your commands — 10 marks Submit the decrypted file — 5 marks ALL SUBMITTED SCREENSHOTS MUST SHOW YOUR SYSTEM TIME ASSIGNMENT — IV — ASYMMETRIC CRYPTOGRAPHY Using techniques shown in class Generate a private and public key, i.e., private.key & public.key Download this file into the OpenSSL folder on your system https://raw.githubusercontent.com/py7hagoras/blacktech/main/Wonderful.txt Encrypt the downloaded file, Wonderful.txt, with the public key to produce a file called “Wonderful.encrypted” Decrypt the encrypted file (Wonderful.encrypted) with the private key to produce a file called “Wonderful.decrypted”

Understanding Asymmetric Cryptography: A Story of Secure File Transfer

Cryptography is an essential aspect of securing digital communication and data transfer. In this article, we delve into the fascinating realm of asymmetric cryptography, a key component of modern cryptographic systems.

Asymmetric Cryptography: An Overview

Asymmetric cryptography, also known as public-key cryptography, employs a pair of keys: a public key and a private key. These keys work together to ensure secure communication over untrusted networks. The public key is shared openly, while the private key is kept confidential.

The Story of Alice and Bob

Let’s explore a scenario involving Alice and Bob, two individuals aiming to securely transfer a file. Alice, the sender, encrypts the file with her private key before sending it to Bob. But did she achieve her objective of maintaining confidentiality?

Answering the Question

On Slide 2 of the assignment, the query arises: Did Alice achieve her objective? The answer lies in understanding the purpose of encrypting with a private key. In asymmetric cryptography, encrypting with the private key provides authentication, not confidentiality. It ensures that only the person with the corresponding public key (in this case, Bob) can decrypt the file.

Bob, upon receiving the encrypted file, must verify its origin.

Verifying the Origin

To verify that the files can only be from Alice, Bob needs to decrypt the file using Alice’s public key. If the decryption is successful, it confirms that the file was indeed encrypted with Alice’s private key. This step ensures the authenticity of the file and verifies its origin.

Assignments on Slide 3 and 4.

Securely Distributing a Secret Password

To securely distribute a secret password to everyone in the class using asymmetric cryptography, follow these steps:

  1. Each student generates their own key pair (public and private keys).
  2. Students share their public keys with the class.
  3. The sender encrypts the secret password with each recipient’s public key.
  4. Recipients use their private keys to decrypt the message and obtain the password.
  5. The process ensures secure distribution without revealing the password during transmission.

Now, let’s move on to Assignment III on Symmetric Cryptography.

Symmetric Cryptography Assignment

For this assignment, we use OpenSSL to decrypt a file named “Wonderful.enc” with the password “blacktech.” Follow these steps:

  1. Download and extract OpenSSL from https://indy.fulgan.com/SSL/.
  2. Save the encrypted file from https://raw.githubusercontent.com/py7hagoras/blacktech/main/Wonderful.enc.
  3. Open a terminal and navigate to the OpenSSL folder.
  4. Run the following command
  5. Take a screenshot of your commands and the decrypted file.

Now, let’s conclude with Assignment IV on Asymmetric Cryptography.

Asymmetric Cryptography Assignment

In Assignment IV, we generate a key pair, encrypt a file with the public key, and then decrypt it with the private key.

  1. Generate the key pair using the commands demonstrated in class
  2. Download the file Wonderful.txt into the OpenSSL folder.
  3. Encrypt the file with the public key
  4. Decrypt the encrypted file with the private key:

Submit screenshots of your commands and the decrypted file.

In conclusion, asymmetric cryptography plays a crucial role in ensuring secure communication and data transfer. Understanding its principles is essential for implementing robust cryptographic solutions. If you have any questions or need further clarification, feel free to ask!

Submit your assignment screenshots on Google Classroom.

The decrypted file shows “Blacktech is Wonderful”.

4. ASYMMETRIC CRYPTOGRAPHY

(GENERATION OF PRIVATE KEY USING OPENSSL)

5.GENERATION OF PUBLIC KEY USING OPENSSL

6.WONDERFUL.TXT

7.ENCRYPTION OF WONDERFUL.TXT

8.DECRYPTION OF WONDERFUL.TXT

9.DIRECTORY COMMAND “DIR”TO SHOW ALL FILES ON OPENSSL

Let’s talk about how valuable data can be?

Data is very important,guard it.