CIS410_Exploring_Encryption_Methods

CIS410_Exploring_Encryption_Methods - CCNA Security...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CCNA Security Exploring Encryption Methods Topology Objectives Part 1: (Optional) Build the Network and Configure the PCs Connect the PCs and configure IP addresses. Part 2: Decipher a Pre-encrypted Message Using the Vigenere Cipher Given an encrypted message, a cipher key, and the Vigenere cipher square, decipher the message. Part 3: Create a Vigenere Cipher Encrypted Message and Decrypt It Work with a lab partner and agree on a secret password. Create a secret message using the Vigenere cipher and the key. Exchange messages and decipher them using the pre-shared key. Use an interactive Vigenere decoding tool to verify decryption. Part 4: Use Steganography to Embed a Secret Message in a Graphic Create a secret message and save it as a .txt file. Use S-Tools to embed the secret text message into a .bmp graphic. Send the graphic to a lab partner to reveal the embedded message. Background The Cisco IOS password encryption service uses a Cisco-proprietary algorithm that is based on the Vigenere cipher. Vigenere is an example of a common type of cipher
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
mechanism called polyalphabetic substitution. Although not a strong encryption technique, Vigenere serves to illustrate a commonly used encryption and decryption process. Note: Students can work in teams of two for this lab. Required Resources 2 switches (Cisco 2960 or comparable) PC-A (Windows XP or Vista) PC-B (Windows XP or Vista) Ethernet cables as necessary
Background image of page 2
Part 1: (Optional) Build the Network and Configure the PCs In Part 1 of this lab, you connect the PCs and configure IP addresses. This is not required to perform the lab, unless you want to copy files between PCs. Step 1: Cable the network as shown in the topology. Attach the devices shown in the topology diagram, and cable as necessary. Note: The switches in the topology can be omitted and the PCs connected directly together using a crossover cable, if desired. This is only necessary if the files used in the lab are to be exchanged by copying them from one PC to the other, If files are to be exchanged using removable media, such as a flash drive or floppy disk, no cabling is required. Step 2: Configure PC host IP settings. Configure a static IP address and subnet mask for PC-A and PC-B as shown below. A default gateway is not required because the PCs are on the same local network. PC-A IP address: 192.168.1.1, Subnet mask 255.255.255.0 PC-B IP address: 192.168.1.2, Subnet mask 255.255.255.0 Step 3: Verify connectivity between PC-A and PC-B. Ping from PC-A to PC-B. Are the ping results successful? If the pings are not successful, troubleshoot the basic device configurations before continuing.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Part 2: Decipher a Pre-encrypted Message Using the Vigenere Cipher In Part 2 of this lab, you analyze an encrypted message and decrypt it using a cipher key and the Vigenere cipher square. Step 1: Review the encrypted message.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/09/2011 for the course CIS CIS410 taught by Professor Mr.t during the Spring '11 term at ECPI College of Technology.

Page1 / 17

CIS410_Exploring_Encryption_Methods - CCNA Security...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online