Venue : Makmal Sistem, Building FTMK.
Date : 13-8-2009
Time : 10.00 a.m. – 11.50 a.m.
The title for the lab session this week was “Modern Cryptography”. According to the contents, there are two types of cryptography will be learnt by us and they are RSA algorithm and DES algorithm. For this week, we have learnt about RSA Algorithm. RSA algorithm is one of the algorithms that used to find private and public key. There are several steps need to be gone through according to the lab manual. The most important step for this algorithm is to find modulo numbers with the formulae d = e-1 mod n. Owing to the power of -1for the e value, it could not be solved using the ordinary method. Mr. Zaki taught us the method to calculate it. However, there is still one thing I am not very understand, that is I could not get the same answer for modulo numbers by using calculator. After Mr. Zaki has explained a bit about that, I understood a bit, but I think I still need some time to digest it… …
The last topic for today is Advance Encryption Standard (AES). It is used to replace DES. Instead of using 64 bits, AES uses 128 bit data and 128 or 192 or 256 bit keys. Mr Zaki taught this topic by using a flash clip, so it was quite interesting although the algorithm is much complicated than DES. We need time to digest the two algorithms, so everyone asked Mr Zaki to stop there and continue next week. Hope that next week won’t have this kind of algorithms to learn any more before i can understand algorithms just now… ^^
The last method is transposition which the letters are rearranged. Basically, there are two types of transposition, they are unkeyed single transposition and keyed single. There is a simple review question given on the last slide of the chapter. The question is to find the enciphering key for a cipher text. The cipher text given is
Basically, there were four tasks in this lab module. We used VM to complete the four tasks. Before that, I have taken a snapshot before start to do the tasks in case any unpredicted problems occur. The first task was about the use of NTFS to Secure Local Resources. Two main outcomes from this task were: