assignment 3
.pdf
keyboard_arrow_up
School
Toronto Metropolitan University *
*We aren’t endorsed by this school
Course
820
Subject
Computer Science
Date
Dec 6, 2023
Type
Pages
5
Uploaded by GeneralDeerPerson541
ITM820
Assignment-3 (5%)
Digital Envelope and Unix Password Scheme
[N.B. Please update this file and submit the completed file as a PDF]
In this assignment, we will be using the following tools to simulate the digital envelope creation, opening,
and Unix password scheme:
·
AES Encryption and Decryption
Tool link:
https://www.devglan.com/online-tools/aes-encryption-decryption
This online tool allows you to encrypt and decrypt using the AES encryption algorithm
·
RSA Encryption, Decryption, and Public key and private key generator
Tool link:
https://www.devglan.com/online-tools/rsa-encryption-decryption
This online tool allows you to generate a public key and private key pair. In addition, it allows you to
encrypt and decrypt using the RSA encryption algorithm
·
SHA256 Hash Algorithm
Tool link:
https://emn178.github.io/online-tools/sha256.html
This online tool allows you to generate a SHA256 hash code for a given input
·
Random Number Generator
Tool link:
https://randomkeygen.com/
This online tool is used to generate random numbers
Digital Envelope Creation and Opening steps
The figure above shows how a digital envelope is created by the sender and opened by the receiver. In this
part of this assignment, you use the tools to create and open a digital envelope. You can use the key
generator tool to generate a sample key pair for the receiver.
//Include a screenshot of the public key and private key
Text to encrypt and send inside the digital envelope
The digital envelope will have the encrypted text of the following:
"ChatGPT is an artificial intelligence chatbot developed by OpenAI and launched in November 2022. It is
built on top of OpenAI's GPT-3 family of large language models and has been fine-tuned (an approach to
transfer learning) using both supervised and reinforcement learning techniques.ChatGPT was launched as
a prototype on November 30, 2022, and quickly garnered attention for its detailed responses and articulate
answers across many domains of knowledge. Its uneven factual accuracy, however, has been identified as
a significant drawback. Following the release of ChatGPT, OpenAI's valuation was estimated at US$29
billion in 2023."
In the following section,
screenshot and describe
the steps taken by the sender using different tools
to create the envelope to send the encrypted text and the key (do not miss any screenshots, missing
one screenshot means a step is missed):
1.
First a public and private key is generated using the RSA encryption.
2.
Then on AES encryption, the plain text is encrypted, the generated key needs to be copied into the
plain text field of the RSA encryption
3.
The public key generated from RSA needs to be placed in the public key and then encrypted with
the AES encryption.
4.
The new encrypted key goes into a document for the digital envelope
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Case Project 10-1: Password Security
Inadequate password security is one of the areas that the auditors believe needs improve-ment. A former server administrator acquiesced to bank employees’ complaints about fre-quent password changes and set very lax account policies for passwords. The audits raised the following concerns:
Some bank employees have used the same user account password for several years.
Many of the existing passwords are only four or five characters in length.
Several bank employees regularly change their passwords but rotate between the same three or four passwords with each change.
An employee who has forgotten a password can keep trying different combinations for as long as they like, until they hit upon the password or give up trying.
What capabilities in Windows Server 2016 enable the bank to address the auditors’ concerns? Create a detailed report of your recommendations for the bank’s Audit Response Committee. Also, for the IT manager who is a committee…
arrow_forward
Applications are programs that interact directly with the database.
nttps:/
ale.com/forms/dle/1EAlOLSGR04inn-90woSesaBaXvosORamilZEoeRAWiomkesponse
1/29 9 PM
False
True
arrow_forward
البوابة التعليمية الإلكترونية لجامعة الإس
In website development, it's much easier to use An absolute path
Select one:
O True
O False
CGI programs often serve as an interface between a database and
arrow_forward
Design and develop android application that inserts movie information into database. The following is required:
Validation: duration must be >0 and less than 20 (Show appropriate toast message otherwise)
Movie rating is a drop down list with values between 1 and 10
Movie year is a drop down list with values from 1950 until today's year
Show appropriate success message (using dialog) when the movie is successfully added to database
Insert movie information to database is achieved using a php web service
Database type is MYSQL
You should submit the following:
o Java files
Layout files
o AndroidManifest.xml
o Build.gradle that contains the dependencies of your project
o php web service file
Table movie looks like the following:
Mid
Mname
Duration
Rating
myear
The design looks like the following:
Movie Name
Movie Duration
Movie Rating
Movie Year
Add Movie
arrow_forward
Why are access restrictions needed today? Please list two access restrictions.
arrow_forward
Copyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01-
5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any
website or service constitutes as an academic integrity violation and is an infringement of copyright.
Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that
her employees are having a hard time learning about all of the products that they sell which has led
to some struggles with providing excellent customer service. What would you recommend to Selena
to help with this issue? Choose the best answer from the options that are available below.
O Cloud based enterprise system
Customer relationship management system
Knowledge management system
None of the options are correct
O Supply chain management system
0.2 pts
Question 40
Copyright notice: This question is part of a graded exam and cannot be redistributed…
arrow_forward
Database encryption levels are mentioned.
arrow_forward
Create a form to insert/update/delete medicine details into the database. in c# (.
Pharmacy Store)
arrow_forward
Data Encryption Standard
Perform a Data Encryption Standard encryption on the plaintext (PL) by using key (K). The PL is your first 8 characters of your name and K is the last 8 digits of your student ID.
For example:
Name: Siti Fajar
Plain text (PL): SITIFAJA
Student ID: 201908040016
Key (K): 08040016
Show detail step by step involved.
arrow_forward
Describe the role of exception handling in database operations and transactions when working with file-based databases.
arrow_forward
Differentiate between shallow copy and deep copy with example. Explain the code.
arrow_forward
Font
Paragraph
Styles
Editing
Dictate
Editor
Reuse
aste
Files
Styles
Voice
Sensitivity
Editor
Reuse Files
oboard
You have just been hired as a consultant for a big Health Care provider. Impressed by your
background in databases, they want you to completely redesign their database system.
Talking with the people at the HC provider, you get the following information (be very
careful on some of these attributes, and apply everything you have learned to this
point:
- The database contains information about patients, hospitals and doctors.
- Each patient has an ID, first name, last name, address and age. A patient is
uniquely identified by his or her ID.
- Each hospital has an id, name and budget. The id uniquely identifies a hospital.
- Each doctor an id, a full name, email address and a favorite movie. The id
uniquely identifies a doctor.
- Each patient can be treated at many hospitals, a hospital can treat many patients.
Each doctor can work at only one hospital. A hospital can have many…
arrow_forward
Differentiate between VIEW and COPY?
arrow_forward
answer question in photo pls
arrow_forward
Explain Access Control list.
arrow_forward
Here is a list of the different encryption settings that can be used on a database.
arrow_forward
2.
arrow_forward
What distinguishes hashing passwords saved in a file from storing them in an encrypted password database?
arrow_forward
Explain the main purpose of hashing a message or file.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Case Project 10-1: Password Security Inadequate password security is one of the areas that the auditors believe needs improve-ment. A former server administrator acquiesced to bank employees’ complaints about fre-quent password changes and set very lax account policies for passwords. The audits raised the following concerns: Some bank employees have used the same user account password for several years. Many of the existing passwords are only four or five characters in length. Several bank employees regularly change their passwords but rotate between the same three or four passwords with each change. An employee who has forgotten a password can keep trying different combinations for as long as they like, until they hit upon the password or give up trying. What capabilities in Windows Server 2016 enable the bank to address the auditors’ concerns? Create a detailed report of your recommendations for the bank’s Audit Response Committee. Also, for the IT manager who is a committee…arrow_forwardApplications are programs that interact directly with the database. nttps:/ ale.com/forms/dle/1EAlOLSGR04inn-90woSesaBaXvosORamilZEoeRAWiomkesponse 1/29 9 PM False Truearrow_forwardالبوابة التعليمية الإلكترونية لجامعة الإس In website development, it's much easier to use An absolute path Select one: O True O False CGI programs often serve as an interface between a database andarrow_forward
- Design and develop android application that inserts movie information into database. The following is required: Validation: duration must be >0 and less than 20 (Show appropriate toast message otherwise) Movie rating is a drop down list with values between 1 and 10 Movie year is a drop down list with values from 1950 until today's year Show appropriate success message (using dialog) when the movie is successfully added to database Insert movie information to database is achieved using a php web service Database type is MYSQL You should submit the following: o Java files Layout files o AndroidManifest.xml o Build.gradle that contains the dependencies of your project o php web service file Table movie looks like the following: Mid Mname Duration Rating myear The design looks like the following: Movie Name Movie Duration Movie Rating Movie Year Add Moviearrow_forwardWhy are access restrictions needed today? Please list two access restrictions.arrow_forwardCopyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01- 5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any website or service constitutes as an academic integrity violation and is an infringement of copyright. Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that her employees are having a hard time learning about all of the products that they sell which has led to some struggles with providing excellent customer service. What would you recommend to Selena to help with this issue? Choose the best answer from the options that are available below. O Cloud based enterprise system Customer relationship management system Knowledge management system None of the options are correct O Supply chain management system 0.2 pts Question 40 Copyright notice: This question is part of a graded exam and cannot be redistributed…arrow_forward
- Database encryption levels are mentioned.arrow_forwardCreate a form to insert/update/delete medicine details into the database. in c# (. Pharmacy Store)arrow_forwardData Encryption Standard Perform a Data Encryption Standard encryption on the plaintext (PL) by using key (K). The PL is your first 8 characters of your name and K is the last 8 digits of your student ID. For example: Name: Siti Fajar Plain text (PL): SITIFAJA Student ID: 201908040016 Key (K): 08040016 Show detail step by step involved.arrow_forward
- Describe the role of exception handling in database operations and transactions when working with file-based databases.arrow_forwardDifferentiate between shallow copy and deep copy with example. Explain the code.arrow_forwardFont Paragraph Styles Editing Dictate Editor Reuse aste Files Styles Voice Sensitivity Editor Reuse Files oboard You have just been hired as a consultant for a big Health Care provider. Impressed by your background in databases, they want you to completely redesign their database system. Talking with the people at the HC provider, you get the following information (be very careful on some of these attributes, and apply everything you have learned to this point: - The database contains information about patients, hospitals and doctors. - Each patient has an ID, first name, last name, address and age. A patient is uniquely identified by his or her ID. - Each hospital has an id, name and budget. The id uniquely identifies a hospital. - Each doctor an id, a full name, email address and a favorite movie. The id uniquely identifies a doctor. - Each patient can be treated at many hospitals, a hospital can treat many patients. Each doctor can work at only one hospital. A hospital can have many…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning