CS656 LAB 1.1: Brute-force Attack using the OpenSSL Library 1/3

CS 656 LAB 1.1 Brute-force Attack using the OpenSSL Library

Notes:

• That is a person lab.

• The code and different solutions you submit MUST be totally your individual work, and you’re certain by the WSU Tutorial Integrity Coverage (https://www.wichita.edu/ about/student_conduct/ai.php). You MAY seek the advice of with different college students about the conceptualization of the duties and the which means of the questions, however you MUST NOT take a look at any a part of another person’s resolution or collaborate with anybody. It’s possible you’ll seek the advice of revealed references, offered that you just appropriately cite them in your experiences and applications, as you’ll do in a tutorial paper.

• Learn the total doc rigorously earlier than you begin engaged on the lab.

GOOD LUCK!

1 Overview

The educational goal of this lab is to get conversant in the ideas in the symmetric and learn to program using the OpenSSL crypto library.

Lab Atmosphere. This lab has been examined on Ubuntu 20.04. You can be given entry to the distant Ubuntu atmosphere with obligatory packages put in. You may additionally run your individual digital machine by downloading it from the SEED labs web site (see the particulars right here: https://github.com/ seed-labs/seed-labs/blob/grasp/manuals/vm/seedvm-manual.md).

2 Submission

Submit a PDF doc together with your solutions to the questions on this lab. Your report ought to have a subheading for every Question Assignment, and your solutions must be inside the corresponding subheading. If relevant, listing the necessary code snippets adopted by rationalization. Merely attaching code with none rationalization won’t obtain credit.

Word: Your report should comprise your Identify (Lastname, Firstname) and WSU ID. Use the following format to your report’s PDF filename: lab1 1 report YOUR WSU ID.pdf. For instance, in case your ID is C656S656, your report must be lab1 1 report c656s656.pdf. Use the following filename format to your program: lab1 1 YOUR WSU ID.. For instance, in the event you use C and your WSU ID is C656S656, your supply file could be lab1 1 c656s656.c. There’s a 10% discount of factors in case your report/submissions file don’t observe the appropriate filename format and/or lacking title/ID inside the doc.

three Lab Job: Brute-force Attack using the Crypto Library

On this lab, you’re given a plaintext and a ciphertext, and your job is to seek out the key that’s used for the encryption. You do know the following info:

https://www.wichita.edu/about/student_conduct/ai.php
https://www.wichita.edu/about/student_conduct/ai.php
https://github.com/seed-labs/seed-labs/blob/grasp/manuals/vm/seedvm-manual.md
https://github.com/seed-labs/seed-labs/blob/grasp/manuals/vm/seedvm-manual.md
CS656 LAB 1.1: Brute-force Attack using the OpenSSL Library 2/three

• The aes-128-cbc cipher is used for the encryption.

• The important thing used to encrypt this plaintext is an English phrase shorter than 16 characters; the phrase will be discovered from a typical English dictionary. Since the phrase has lower than 16 characters (i.e. 128 bits), pound indicators (#: hexadecimal worth is 0x23) are appended to the finish of the phrase to kind a key of 128 bits.

Your purpose is to write down a program to seek out out the encryption key. You might be given the following recordsdata: plaintext.txt ciphertext.txt iv.txt wordlist.txt

Notes:

• On this activity, you’re supposed to write down your individual program to invoke the crypto library. No credit score shall be given in the event you merely use the openssl instructions to do that activity. Pattern code will be discovered from the following URL:

https://www.openssl.org/docs/man1.1.1/man3/EVP_CipherInit.html

• If you compile your code using gcc, don’t forget to incorporate the -lcrypto flag, as a result of your code wants the crypto library. See the following instance for the code filename bfattack.c:

$ gcc -o bfattack bfattack.c -lcrypto

• You should use the starter C file from Lab 1 (i.e., task4 starter bfattack.c)

• You might be allowed to make use of any programming language to finish this activity.

Deliverable. In your report carry out the following actions and reply the questions. Clearly mark Question Assignment numbers.

1. Draw a flowchart of the resolution. [20 Points]

2. Current an algorithmic workflow of your resolution. The algorithm have to be aligned with the flowchart you developed in Step 1. Embrace feedback in your algorithm that clearly marks every of the steps. Word: instantly borrowed pseudocode from the class lecture will observe obtain any factors. [40 Points]

three. What number of search operations you want in the worst-case to seek out the key? Justify your reply with the flowchart and algorithms you developed in the earlier steps. [20 Points]

four. Embrace (a) your code, (b) transient rationalization of your implementation, and (c) the secret key that you just discovered. [10 Points]

5. Present a screenshot of your terminal output exhibiting the command to run the code in addition to the key your discovered. [5 Points]

6. Submit the code file with appropriate filename format. To obtain full credit score, each your report and code file have to be submitted. [5 Points]

CS656 LAB 1.1: Brute-force Attack using the OpenSSL Library three/three

Copyright © 2022 Monowar Hasan. This doc is adopted from Dr. Sergio Salinas Monroy and origninally based mostly on the SEED Labs developed by Dr. Wenliang Du. The contents of this doc are licensed beneath a Artistic Commons Attribution-NonCommercial-ShareAlike four.zero Worldwide License. A human-readable abstract of (and never an alternative choice to) the license is the following: You might be free to repeat and redistribute the materials in any medium or format. You need to give acceptable credit score. Should you remix, rework, or construct upon the materials, you should distribute your contributions beneath the similar license as the unique. It’s possible you’ll not use the materials for business functions.

Overview
Submission
Lab Job: Brute-force Attack using the Crypto Library

Published by
Medical
View all posts