Lab 10 Crypto Asym Sym
Lab 10 Crypto Asym Sym
This lab aims to introduce students to the basic concepts of symmetric and asymmetric
cryptography using real-life scenarios. Students will understand the differences, advantages,
and practical applications of both cryptographic methods.
Instructions
• The lab report must be submitted one week after the lab session on the Moodle
platform, respecting the deadline mentioned there.
• The lab must be performed individually in class, but the report should be submitted in
groups of up to 2 students.
• Lab groups must remain the same for all reports throughout the semester.
Scenario 1: Alice and Bob’s Secret Message
Alice wants to send a secret message to Bob over the internet. They both decide to use AES
encryption.
You connect to an online shopping website (HTTPS). Your browser and the server exchange
keys.
A company wants to ensure that employees can send encrypted emails to each other without
having to manually exchange keys.
The government wants to create an electronic voting system. They want to guarantee that: