Question: Run openssl with the version parameter. Which version of OpenSSL is installed on your computer? OpenSSL 3.4.0 Review the cryptographic algorithms supported by OpenSSL with the openssl list -cipher-commands command. Write the main families (AES, DES, ...) of supported algorithms (name the families you recognise): aes-128-cbc aes-128-ecb aes-192-cbc aes-192-ecb aes-256-cbc aes-256-ecb des des-cbc des-cfb des-ecb des-ede des-ede-cbc des-ede-cfb des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb des-ofb des3 desx Write down the secret key you used for encryption: testing Which algorithm doesn't need a secret key? base64 Write down the above algorithms according to strength, from strongest to weakest: aes-192-cbc base64 des Look at the encrypted files (cat command) and describe them (how do they look? Which characters are within? Is there anything interesting at the beginning of the files? etc.): Both the aes and des have a Salted word at the beginning of the encrypted file. The base64 looks nice on the cat output while the aes and des have unprintable characters in the file Write down the commands for decrypting DES and BASE64 encoded files: openssl enc -d -base64 -in encodec_base64.enc openssl enc -d -des -in encodec_des.enc Create MD5 and SHA1 checksum of the file cleartext.txt: openssl dgst –md5 /tmp/cleartext.txt openssl dgst –sha1 /tmp/cleartext.txt What is the difference between checksums (is there a difference in the number of characters?)? there is a difference between how many characters are used in hashing. Both protocols are outdated. Find the command on the Internet to create one of the hashing protocols supported today. What is the command to create a SHA2 256 bits hash? Which command can be used to create SHA3 256 bits hash? openssl dgst -sha3-512 cleartext.txt openssl dgst -sha2-512 cleartext.txt What is the command to find out all supported digest (hashing) algorithms HINT: check the beginning of the exercise when you learned the supported cryptographic algorithms – it's similar openssl dgst -list Select a random password (instead of <>, enter the desired password. Write down the string you received as a result:$1$Ga9YWsYG$T6VgK9G6BcIC7o8Wrnncq0 Repeat the command with the same password. Did you receive the same result?No You should have, but you didn’t because the OpenSSL, by default, adds two random characters as salt. So what is salt, and what is it used for when hashing the password? A salt is a random number that is needed to access the encrypted data, along with the password. Add your salt (only two characters because the OpenSSL will ignore the rest): Choose the same password as above, and add the salt in front of it. Repeat the process twice. This time the hash should be the same both times. Write down the resulting hash. (replace <> with your own, and <> with the password as above): LUKS+bubif@Luks MINGW64 /x/programiranje/crypto $ openssl passwd -salt 34 testing $1$34$uDhbEEIhgDCgo06sfpWKA0 LUKS+bubif@Luks MINGW64 /x/programiranje/crypto $ openssl passwd -salt 34 testing $1$34$uDhbEEIhgDCgo06sfpWKA0 The MD5 password hash is identified with the first two characters in the result. What is it? gF Generate SHA256 and SHA512 hashes. Write down the command used and the hash type identifiers (first two characters of the resulting hash openssl dgst -sha512 cleartext.txt 8a openssl dgst -sha256 cleartext.txt fb Test whether the number 119054759245460753 is the prime number. Is it? Its not prime Test the number 101. Is it prime? Yes it is prime What kind of format is the number tested by OpenSSL (Binary? Octal? Decimal? Hexadecimal?) Please observe that the OpenSSL changes the number format before testing it! Hexadecimal Write down the command to test the DES algorithm speed openssl speed des For DES (write down the result of the test for des cbc, 64 bytes): 3 seconds