BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, SydneyTutorial #2Total Marks: 30 (6%)Submit your answers to the following questions by Week-5 Friday 5:00PM. Late submissionswill incur 5% deduction with each passing day till Week-6 Friday 5:00PM, after which nosubmissions will be accepted.Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and pastefrom your textbook, online resources, or your friend’s work. Cite and provide reference(Harvard Style) to the original work where applicable.Questions:Q. #1: What is a Hash function? What is its main usage in information security? Perform thefollowing practical task:1. Go to https://emn178.github.io/online-tools/sha256.html.2. Enter your full name as input, calculate its SHA256 hash, and share the result.3. Append a dot (.) to your name, calculate its SHA256 hash, and share your result.4. Do they match?5. Remove the dot (.), is the hash value same as before?(5 Marks)Q. #2: What is the difference between symmetric and asymmetric cryptography? Perform thefollowing practical task:1. Pair up with one of your class-mates for this exercise. (If not feasible, get the help fromany other friend). Exchange email addresses with your partners.2. Go to https://www.devglan.com/online-tools/rsa-encryption-decryption.3. Each student must generate their RSA public and private key pair by using the abovelink. Email your public key to your partner. (Attach the screenshot of the email that yousent).4. Copy and paste your private key here in you answer. (Do not share it with your partner)5. Use your partner’s public key to encrypt a message that must include your name in it.(Hint: Use the left column of the webpage for encryption, and use public key of yourfriend). The message must not be inappropriate. Example: “I am David and I love toplay squash”6. Email the encrypted message to your partner. Your partner will do the same and willsend you an encrypted message. Share the screenshots.7. Decrypt the encrypted text sent by your partners using the same link. (Hint: Use theright column of the webpage for decryption, and use your private key). Share thescreenshot.8. Were you able to recover the cyphertext? Email the plaintext (recovered text) to yourfriend. (5 Marks)Q. #3: Write the process of generating Digital Signatures in your own words? Create a flowchart of the process using pen and paper, take its photo and attach. (5 Marks)BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, SydneyQ. #4: What are Digital Certificates and what is their usage? What weakness in Digitalsignatures led towards Digital Certificates? (5 Marks)Q. #5: Go to page 187 of your e-textbook*, complete the task Case Project 4-4: HTTPS andsubmit your response. (10 Marks)* Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning,United States.Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS