HANDS-ON
INFORMATION
           SECURITY LAB MANUAL
                                                                    Course summary
             The course provides knowledge about information security, encryption and
         decryption algorithms that are commonly used today. In this course, students will
         get acquainted and practice writing encryption and decryption programs with such
         classical algorithms as Caesar, Vigenère, Rail Fence, PlayFair, Transposition; In
         addition, modern algorithms such as DES, 3DES, AES are also provided, finally
         hash algorithms such as MD5, SHA.
                        FACULTY OF INFORMATION TECHNOLOGY
                                                   For internal circulation only, 2023
HANDS-ON INFORMATION SECURITY LAB
                                                  FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                                                                                                                                               i
                                                                     Contents
  PRACTICE 1: CLASSICAL SYMMETRIC ENCRYPTION............................................................................ 1
         OVERVIEW................................................................................................................................................... 1
        1.1.1 Introduction ............................................................................................................................................ 1
        1.1.2 Objective ................................................................................................................................................. 1
         CONTENTS ................................................................................................................................................... 1
        1.2.1 Basic knowledge ..................................................................................................................................... 1
        1.2.2 Caesar Cipher......................................................................................................................................... 2
  PRACTICE 2: CLASSICAL SYMMETRIC ENCRYPTION (CONT.) ........................................................... 8
         OVERVIEW................................................................................................................................................... 8
        2.1.1 Introduction ............................................................................................................................................ 8
        2.1.2 Objective ................................................................................................................................................. 8
         CONTENTS ................................................................................................................................................... 8
        2.2.1 Basic knowledge ..................................................................................................................................... 8
        2.2.2 Vigenère Cipher ...................................................................................................................................... 9
        2.2.3 Rail Fence Cipher ................................................................................................................................. 13
  PRACTICE 3: CLASSICAL SYMMETRIC ENCRYPTION.......................................................................... 16
         OVERVIEW................................................................................................................................................. 16
        3.1.1 Introduction .......................................................................................................................................... 16
        3.1.2 Objective ............................................................................................................................................... 16
         CONTENTS ................................................................................................................................................. 16
        3.2.1 Basic knowledge ................................................................................................................................... 16
        3.2.2 Playfail Algorithm ............................................................................................................................... 17
        3.2.3 Transposition cipher ............................................................................................................................ 23
  PRACTICE 4: MODERN SYMMETRIC ENCRYPTION .............................................................................. 26
         OVERVIEW................................................................................................................................................. 26
        4.1.1 Introduction .......................................................................................................................................... 26
        4.1.2 Objective ............................................................................................................................................... 26
         CONTENTS ................................................................................................................................................. 26
        4.2.1 Basic knowledge ................................................................................................................................... 26
        4.2.2 DES Encrypt ........................................................................................................................................ 27
        4.2.3 3DES Encrypt ....................................................................................................................................... 33
  PRACTICE 5: MODERN SYMMETRIC ENCRYPTION (CONT.) .............................................................. 38
         OVERVIEW................................................................................................................................................. 38
        5.1.1 Introduction .......................................................................................................................................... 38
        5.1.2 Objective ............................................................................................................................................... 38
         CONTENTS ................................................................................................................................................. 38
        5.2.1 Basic knowledge ................................................................................................................................... 38
        5.2.2 AES Encrypt .......................................................................................................................................... 40
  PRACTICE 6: PUBLIC ENCRYPTION RSA .................................................................................................. 47
HANDS-ON INFORMATION SECURITY LAB
                                                                                         FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                                                                                                                                                 ii
          OVEVIEW ................................................................................................................................................... 47
         6.1.1 Introduction .......................................................................................................................................... 47
         6.1.2 Objective ............................................................................................................................................... 47
          CONTENTS ................................................................................................................................................. 47
         6.2.1 Basic knowledge ................................................................................................................................... 47
         6.2.2 Public Encryption RSA ........................................................................................................................ 48
         6.2.3 Public Encryption RSA (Cont.) ............................................................................................................ 52
  PRACTICE 7: KEY MANAGEMENT USING PUBLIC ENCRYPTION ..................................................... 57
          OVERVIEW................................................................................................................................................. 57
         7.1.1 Introduction .......................................................................................................................................... 57
         7.1.2 Objective ............................................................................................................................................... 57
          CONTENTS ................................................................................................................................................. 57
         7.2.1 Basic knowledge ................................................................................................................................... 57
         7.2.2 Public Encryption ................................................................................................................................. 58
  PRACTICE 8: KEY MANAGEMENT USING PUBLIC ENCRYPTION (CONT.) ..................................... 64
          OVERVIEW................................................................................................................................................. 64
         8.1.1 Introduction .......................................................................................................................................... 64
         8.1.2 Objective ............................................................................................................................................... 64
          CONTENTS ................................................................................................................................................. 64
  PRACTICE 9: HASH FUNCTION ..................................................................................................................... 70
          OVERVIEW................................................................................................................................................. 70
         9.1.1 Introduction .......................................................................................................................................... 70
         9.1.2 Objective ............................................................................................................................................... 70
          CONTENTS ................................................................................................................................................. 70
         9.2.1 Basic knowledge ................................................................................................................................... 70
         9.2.2 MD5 ...................................................................................................................................................... 71
         9.2.3 SHA ....................................................................................................................................................... 76
HANDS-ON INFORMATION SECURITY LAB
                                                                                          FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                               CLASSICAL SYMMETRIC ENCRYPTION            1
           Practice 1: CLASSICAL SYMMETRIC
                           ENCRYPTION
       OVERVIEW
1.1.1 Introduction
-     Lab 1: Caesar Encryption Algorithm
-     Practice time: class: 3 study hours, self-study: 3 study hours.
-     Requirements: Students using Netbeanss Software
1.1.2 Objective
-     This course provides students with knowledge of cryptographic algorithms and how they
      are used in today's world.
-     The content emphasizes the principles, topics, approaches, and problem solving related to
      the underlying technologies and architectures of the field.
      CONTENTS
1.2.1 Basic knowledge
      One of the simplest and most well-known encryption methods is the Caesar cipher, often
known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift. Each letter in the
plaintext is replaced by a letter that is located a certain number of places farther down the
alphabet in this form of substitution cipher. With a left shift of 3, for instance, D would
become A, E would become B, and so on. Julius Caesar, who employed it in his personal
communications, gave the approach its name.
       We in turn index the letters starting from 0.
       Let “k” be an integer from 0 -> 25 called key.
    HANDS-ON INFORMATION SECURITY LAB
                                                      FACULTY OF INFORMATION TECHNOLOGY
    MANUAL
                                        CLASSICAL SYMMETRIC ENCRYPTION           2
    Encryption function: E(p,k)=(p+k)mod26 where p is the index of the character to be
      encoded.
    Decryption function: D(c,k)=|c-k|mod26 where c is the index of the character to be
      decoded
1.2.2 Caesar Cipher
   Write a program to encrypt and decrypt text with Caesar encryption algorithm. The
program can perform the following functions:
       Allow text input into the system.
       Allows entering text protection keys.
       Allows to write File and open File.
      Guide:
    Step 1: Starting Netbeans sofware  File  New Project  Next:
       Categories: Java
       Project: Java Application
 HANDS-ON INFORMATION SECURITY LAB
                                                FACULTY OF INFORMATION TECHNOLOGY
 MANUAL
                                     CLASSICAL SYMMETRIC ENCRYPTION        3
   Step 2: Tying for project  Finish:
    Project Name: Lab1
    Project Location: Optional
HANDS-ON INFORMATION SECURITY LAB
                                           FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                    CLASSICAL SYMMETRIC ENCRYPTION        4
   Step 3: Create new jFrame Form:
   Step 4: Typing Class Name: Caesar_Cipher
HANDS-ON INFORMATION SECURITY LAB
                                          FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                     CLASSICAL SYMMETRIC ENCRYPTION        5
   Step 5: Design Form:
   Step 6: Design follow:
   Step 7: Write an event handler function:
      7.1 Encrypt function:
HANDS-ON INFORMATION SECURITY LAB
                                           FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                    CLASSICAL SYMMETRIC ENCRYPTION        6
      7.2 Write File:
      7.3 Decrypt function
HANDS-ON INFORMATION SECURITY LAB
                                          FACULTY OF INFORMATION TECHNOLOGY
MANUAL
                                    CLASSICAL SYMMETRIC ENCRYPTION        7
      7.4 Open File:
     Result:
HANDS-ON INFORMATION SECURITY LAB
                                          FACULTY OF INFORMATION TECHNOLOGY
MANUAL