0% found this document useful (0 votes)
12 views3 pages

Lab 10 Crypto Asym Sym

Lab 10 focuses on introducing students to symmetric and asymmetric cryptography through real-life scenarios. Students will explore various applications and challenges of cryptographic methods, including key exchanges and data protection in contexts like secure messaging, online shopping, and electronic voting. The lab report is to be submitted in pairs after completing individual lab work, with specific scenarios guiding the learning objectives.

Uploaded by

Smail Ighmour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

Lab 10 Crypto Asym Sym

Lab 10 focuses on introducing students to symmetric and asymmetric cryptography through real-life scenarios. Students will explore various applications and challenges of cryptographic methods, including key exchanges and data protection in contexts like secure messaging, online shopping, and electronic voting. The lab report is to be submitted in pairs after completing individual lab work, with specific scenarios guiding the learning objectives.

Uploaded by

Smail Ighmour
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab 10: Fundamental Security

Instructor: Prof. Anass Sebbar


Level: Engineering - 3rd Year

Lab 10: Introduction to Cryptography (Symmetric and


Asymmetric)
Objectives

This lab aims to introduce students to the basic concepts of symmetric and asymmetric
cryptography using real-life scenarios. Students will understand the differences, advantages,
and practical applications of both cryptographic methods.

Instructions
• The lab report must be submitted one week after the lab session on the Moodle
platform, respecting the deadline mentioned there.
• The lab must be performed individually in class, but the report should be submitted in
groups of up to 2 students.
• Lab groups must remain the same for all reports throughout the semester.
Scenario 1: Alice and Bob’s Secret Message

Alice wants to send a secret message to Bob over the internet. They both decide to use AES
encryption.

1. What type of cryptography is Alice using?


2. What challenge do Alice and Bob face when choosing AES?
3. Why would Alice not use RSA directly to encrypt a large file?

Scenario 2: The Online Shopping Website

You connect to an online shopping website (HTTPS). Your browser and the server exchange
keys.

4. What cryptographic method is first used to exchange session keys securely?


5. After the key exchange, what type of cryptography protects the rest of the
communication?
6. Why does the system switch to symmetric encryption after key exchange?

Scenario 3: The Company Email

A company wants to ensure that employees can send encrypted emails to each other without
having to manually exchange keys.

7. Which type of cryptography solves this problem?


8. How does asymmetric cryptography solve the key exchange problem?
9. What happens if the private key is stolen?

Scenario 4: The Secure Voting System

The government wants to create an electronic voting system. They want to guarantee that:

 Only registered voters can vote.


 Votes cannot be altered.
 Votes remain anonymous.

10. Which cryptographic method would be best to verify voter identity?


11. Which method would be used to protect the data transmission of votes?
12. How can digital signatures be used in this context?

Scenario 5: The Lost USB Stick


A manager loses a USB stick containing sensitive files. Fortunately, the files are encrypted
with AES.

13. What type of cryptography was used?


14. What prevents someone who finds the USB stick from accessing the files?
15. Why would it have been dangerous to use only asymmetric encryption for large files
on a USB stick?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy