information security(160702) - · pdf filecourse in information security (160702) ... 3 write...
TRANSCRIPT
![Page 1: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/1.jpg)
VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY Gandhinagar
Department of Computer Enggineering
Information Security(160702)
Name :
Enroll no.
:
Class
: 6th SEM C.E.
Year
: 2014-15
![Page 2: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/2.jpg)
VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY
Gandhinagar
CERTIFICATE
This is certify that
Mr./Ms.______________________________ Roll No. ___________________ of B.E Third Year 6th Sem C.E. has satisfactory completed the course in Information Security (160702).
_______________________ ____________________ Signature of Faculty Signature of HOD
DATE OF SUBMISSION: / / 2015
![Page 3: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/3.jpg)
Index
Sr. No. Description Page No.
Date Sign
1 Implement your own symmetric key algorithm for
encryption and decryption using C. 1 / /15
2 Write a Program to implement a Ceaser Cipher. 5 / /15 3 Write a Program to implement a RSA Algorithm. 7 / /15 4
To study about stereography. Hide some text data
behind image by using openstegno tool. 9 / /15
5 To study about various attack scenarios and perform
man in the middle attack. 13 / /15
6 To study about crypt tool and hash calc. 17 / /15 7
Installation and configuration of Active directory on
server 2008. 21 / /15
8
Connect client computer to the active directory
domain and login using users created in active
directory. 26 / /15
9 Implement https (Secure http) on server 2008. 34 / /15 10 Configure FTP server with IPsec. 44 / /15 11 Implement Brute force attack. 56 / /15
![Page 4: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/4.jpg)
Information Security VICT CE 2014-15 1
©Krunal Bhardwaj
Practical – 1
AIM : Implement your own symmetric key algorithm for encryption and
decryption using C.
Program :
#include<stdio.h>
#include<string.h>
void cipher(int i,int c);
int findMin();
void makeArray(int,int);
char arr[22][22],darr[22][22],emessage[111],retmessage[111],key[55];
char temp[55],temp2[55];
int k=0;
int main()
{
char *message,*dmessage;
int i,j,klen,emlen,flag=0;
int r,c,index,min,rows;
clrscr();
printf("Enetr the key\n");
fflush(stdin);
gets(key);
printf("\nEnter message to be ciphered\n");
fflush(stdin);
gets(message);
strcpy(temp,key);
klen=strlen(key);
k=0;
for(i=0; ;i++)
{
if(flag==1)
break;
for(j=0;key[j]!=NULL;j++)
{
if(message[k]==NULL)
{
flag=1;
arr[i][j]='-';
}
else
{
arr[i][j]=message[k++];
}
}
}
![Page 5: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/5.jpg)
Information Security VICT CE 2014-15 2
©Krunal Bhardwaj
r=i;
c=j;
for(i=0;i<r;i++)
{
for(j=0;j<c;j++)
{
printf("%c ",arr[i][j]);
}
printf("\n");
}
k=0;
for(i=0;i<klen;i++)
{
index=findMin();
cipher(index,r);
}
emessage[k]='\0';
printf("\nEncrypted message is\n");
for(i=0;emessage[i]!=NULL;i++)
printf("%c",emessage[i]);
printf("\n\n");
emlen=strlen(emessage); //emlen is length of encrypted message
strcpy(temp,key);
rows=emlen/klen; //rows is no of row of the array to made from ciphered message
rows;
j=0;
for(i=0,k=1;emessage[i]!=NULL;i++,k++)
{
//printf("\nEmlen=%d",emlen);
temp2[j++]=emessage[i];
if((k%rows)==0)
{
temp2[j]='\0';
index=findMin();
makeArray(index,rows);
j=0;
}
}
printf("\nArray Retrieved is\n");
k=0;
for(i=0;i<r;i++)
{
for(j=0;j<c;j++)
{
printf("%c ",darr[i][j]);
//retrieving message
retmessage[k++]=darr[i][j];
}
printf("\n");
}
![Page 6: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/6.jpg)
Information Security VICT CE 2014-15 3
©Krunal Bhardwaj
retmessage[k]='\0';
printf("\nMessage retrieved is\n");
for(i=0;retmessage[i]!=NULL;i++)
printf("%c",retmessage[i]);
getch();
return(0);
}
void cipher(int i,int r)
{
int j;
for(j=0;j<r;j++)
{
emessage[k++]=arr[j][i];
} // emessage[k]='\0';
}
void makeArray(int col,int row)
{
int i,j;
for(i=0;i<row;i++)
{
darr[i][col]=temp2[i];
}
}
int findMin()
{
int i,j,min,index;
min=temp[0];
index=0;
for(j=0;temp[j]!=NULL;j++)
{
if(temp[j]<min)
{
min=temp[j];
index=j;
}
}
temp[index]=123;
return(index);
}
![Page 7: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/7.jpg)
Information Security VICT CE 2014-15 4
©Krunal Bhardwaj
Output:
Encryption:
Decryption:
![Page 8: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/8.jpg)
Information Security VICT CE 2014-15 5
©Krunal Bhardwaj
Practical – 2
AIM : Write a Program to implement a Ceaser Cipher.
Program :
#include<stdio.h>
#include<conio.h>
#include<string.h>
void main()
{
int i,j,shift,k,temp;
char pt[100],ency[100];
char value(int);
clrscr();
printf("Please Enter The PlainText=\n");
gets(pt);
printf("Please Enter The shift value=\n");
scanf("%d",&shift);
printf("\n \n The Encrypted Text is=\n");
for (i=0;i<strlen(pt);i++)
{
if (pt[i]==' ')
{
ency[i]=pt[i];
printf("%c",pt[i]);
}
else
{
if (pt[i]=='.')
{
ency[i]=pt[i];
printf("%c",pt[i]);
}
else
{
temp=pt[i]+shift;
ency[i]=temp;
printf("%c",temp);
}
}
}
printf("\n \n The Decrypted Text is=\n");
![Page 9: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/9.jpg)
Information Security VICT CE 2014-15 6
©Krunal Bhardwaj
for (i=0;i<strlen(pt);i++)
{
if (ency[i]==' ')
{
printf("%c",ency[i]);
}
else
{
if (ency[i]=='.')
{
printf("%c",pt[i]);
}
else
{
temp=ency[i]-shift;
printf("%c",temp);
}
}
}
ency[i]='\0';
getch();
}
Output:-
![Page 10: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/10.jpg)
Information Security VICT CE 2014-15 7
©Krunal Bhardwaj
Practical – 3
AIM : Write a Program to implement a RSA Algorithm.
Program :
#include<stdio.h>
#include<conio.h>
void main()
{
int p,q,n,e,i;
int temp,temp1,d,pt,c,m;
clrscr();
printf("Enter The first Prime number=\n");
scanf("%d",&p);
printf("Enter The second Prime number=\n");
scanf("%d",&q);
n=p*q;
q=(p-1)*(q-1);
e=2;
while (e>1)
{
if (q%e!=0)
goto end;
else
e++;
}
end :
d=1;
temp=e-2;
d=((temp*q)+1)/e;
last:
printf("\nd=%d",d);
printf("\nThe Public Key is e={%d} and n={%d}\n",e,n);
printf("The Private Key is d={%d} and n={%d}\n",d,n);
printf("Enter The Plain Text=\n");
scanf("%d",&pt);
c=1;
printf("The cipher text is=\n");
for (i=0;i<e;i++)
c=c*pt%n;
c=c%n;
printf("%d",c);
m=1;
printf("\nThe Decryeted text is=\n");
![Page 11: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/11.jpg)
Information Security VICT CE 2014-15 8
©Krunal Bhardwaj
for (i=0;i<e;i++)
m=m*c%n;
m=m%n;
printf("%d\n",m);
getch();
}
Output:-
![Page 12: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/12.jpg)
Information Security VICT CE 2014-15 9
©Krunal Bhardwaj
Practical – 4
AIM : To study about stereography. Hide some text data behind image by
using openstegno tool.
Introduction :
(1) What is steganography?
Steganography is the science of hidisng secret message inside another larger and
harmless looking message. This is one notch above regular cryptography; which just obscures
the original message. Steganography tries to conceal the fact that there is a message in the
first place. Steganography message often appears to be something else than the original
(secret) message, like a picture, sound, larger text, etc.
Some terms related to Steganography:
Plaintext: The original secret message that needs to be communicated.
Cipher text: Secret message is often first encrypted using traditional methods.
Encrypted message is known as cipher text.
Cover text: A larger and harmless looking data which is used as container for the
plaintext/cipher text. This can be a picture, sound, text, etc.
Stegotext: The data generated after embedding the plaintext/cipher text into the cover
text.
(2) How steganography work?
The normal procedure is to first encrypt the plaintext to generate the cipher text, and
then modify the cover text in some way to contain the cipher text. The generated Stegotext is
sent over to the intended recipient. If a third party snoops the Stegotext in between, then they
will just see some harmless looking picture (or sound, etc). Once the recipient receives the
Stegotext, the cipher text is extracted from it by reversing the logic that was used to embed it
in the first place. The cipher text is decrypted using the traditional cryptography to get back
the original plaintext.
The steganography will work smartly using Openstego tool as describe following steps.
![Page 13: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/13.jpg)
Information Security VICT CE 2014-15 10
©Krunal Bhardwaj
(3) OpenStego (Demonstration)
(i) Download OpenStego, and extract the same using any unzip application. Start
the application by executing openstego.bat (on Windows) or
openstego.sh (on *NIX). (For using OpenStego from command-line,
please refer here)
(ii) Embedding Data
Consider the scenario where Alice wants to send a text (secret.text) to Bob.
The picture is a sensitive data, and needs to be sent such that no one can make
out that it is being sent over to Bob. In this case, Alice will first select a
harmless looking bigger sized picture (wallpaper.png) and use it as the cover
file. Both the pictures are shown below as an example:
Here, secret. text =Hello…..
Alice will start OpenStego, and under "Embed" tab, she will select secret.jpg as
the "Source Data File (Message file)", wallpaper.png as the "Source Image File (Cover file)", and send.png as "Output Image File (Stego file)". For extra layer of security, she would also like to encrypt the secret data before embedding, and so she will check the "Encrypt Data" checkbox, and provide a password.
![Page 14: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/14.jpg)
Information Security VICT CE 2014-15 11
©Krunal Bhardwaj
On clicking "OK" button, OpenStego will embed the secret.jpg file into the
wallpaper.png, and will generate send.png as the output, as shown below.
send.png & wallpaper.png
There is essentially no visible difference between the original wallpaper.png and
generated send.png. Alice can safely send over the send.png file to Bob. If someone snoops
the file in the middle, he/she will just find a harmless wallpaper image.
![Page 15: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/15.jpg)
Information Security VICT CE 2014-15 12
©Krunal Bhardwaj
(iii)Extracting Data
On receiving the image file from Alice, Bob will extract the original message
file using OpenStego. Under the "Extract" tab, he will select send.png as the
"Image File Containing Embedded Data (Stego file)", and select a suitable folder
for "Output Folder for Data File (Message file)".
On clicking "OK" button, OpenStego will prompt for the password that was used to embed
the original file. Alice should have passed the password to Bob to enable him to extract the
data.
Bob will type in the password and click "OK". OpenStego will extract the original secret.jpg
file, and display the information message accordingly.
You can check that the extracted secret.jpg file is same as the original one.
![Page 16: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/16.jpg)
Information Security VICT CE 2014-15 13
©Krunal Bhardwaj
Practical – 5
AIM : To study about various attack scenarios and perform man in the middle
attack.
Program :
ATTACK SCENARIOS
The popularity of scenarios have been increased among software engineers and are
proven to be valuable for eliciting information about systems requirements, communicating
with stakeholders and providing context for requirements (Ryser, 2000). As a result,
scenarios have been applied in many different areas of computer science research, such as
software engineering (Potts, 1994), business-process reengineering (Anton, 1994), and user
interface design (Carroll, 1991). In particular, many cases can be found in the literature (Ryser, 1999 – Ryser 2000 – Lalioti, 1995), where scenarios have been used for the validation of requirements.
As such, we define a Security Attack Scenario as an attack situation describing the actors
of a software system and their secure capabilities as well as possible attackers and their
goals, and it identifies how the secure capabilities of the system’s actors prevent (if they
prevent) the satisfaction of the attackers’ goals. A Security Attack Scenario involves a
possible attacker, possible attack(s), the resources that are attacked, and the actors of the
system related to the attack together with their secure capabilities.
Man in the Middle (MITM) Attack
What Is a Man-in-the-Middle Attack?
A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts
him/herself into a conversation between two parties, impersonates both parties and gains
access to information that the two parties were trying to send to each other. A man-in-the-
middle attack allows a malicious actor to intercept, send and receive data meant for someone
else, or not meant to be sent at all, without either outside party knowing until it is too late.
Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM
or MIM.
Key Concepts of a Man-in-the-Middle Attack
Man-in-the-middle is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems.
A MITM attack exploits the real-time processing of transactions, conversations or transfer of other data.
Man-in-the-middle attacks allow attackers to intercept, send and receive data never meant to be for them without either outside party knowing until it is too late.
![Page 17: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/17.jpg)
Information Security VICT CE 2014-15 14
©Krunal Bhardwaj
Man-in-the-Middle Attack Examples
In the image above, you will notice that the attacker inserted him/herself in-between the flow
of traffic between client and server. Now that the attacker has intruded into the
communication between the two endpoints, he/she can inject false information and intercept
the data transferred between them.
Below is another example of what might happen once the man in the middle has inserted
him/herself.
![Page 18: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/18.jpg)
Information Security VICT CE 2014-15 15
©Krunal Bhardwaj
The hacker is impersonating both sides of the conversation to gain access to funds. This
example holds true for a conversation with a client and server as well as person-to-person
conversations. In the example above, the attacker intercepts a public key and with that can
transpose his own credentials to trick the people on either end into believing they are talking
to one another securely.
Interactions Susceptible to MITM Attacks
Financial sites – between login and authentication Connections meant to be secured by public or private keys Other sites that require logins – where there is something to be gained by having access
Here, we use the Ettercap to understand the MITM in Network.
(1) Install the Ettercap in to the computer.
(2) After installation open Ettercap, select sniff mode and select your network
interface as shown below.
(3) Now scan for hosts in your sub net by going to Hosts ---> scan for hosts
![Page 19: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/19.jpg)
Information Security VICT CE 2014-15 16
©Krunal Bhardwaj
(4) Now open host list from hosts tab and select the IP address of the victim as target 1
and IP address of the router as target 2
(5) Now start ARP poisoning by going to mitm ---> ARP Poisoning
Finally start the sniffer by going to start ---> start sniffing. Now if the victim logs into
Gmail, face book yahoo mail...etc .we will get his user name and password.
![Page 20: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/20.jpg)
Information Security VICT CE 2014-15 17
©Krunal Bhardwaj
Practical – 6 AIM : To study about crypt tool and hash calc.
Cryptool:
1. Ceaser Encryption/Decryption:-
Plain Text:-
Krunal Bhardwaj
Key:-D
Encryption
Decryption
![Page 21: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/21.jpg)
Information Security VICT CE 2014-15 18
©Krunal Bhardwaj
2. Vigenere Encryption/Decryption:-
Plain Text:-
Krunal Bhardwaj
Shift Value:- 1,2,3
Key:-BCD
Encryption
Decryption
![Page 22: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/22.jpg)
Information Security VICT CE 2014-15 19
©Krunal Bhardwaj
3. PlayFair Encryption/Decryption:-
Plain Text:-
Krunal Bhardwaj
Key:-DAK
Encryption
Decryption
![Page 23: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/23.jpg)
Information Security VICT CE 2014-15 20
©Krunal Bhardwaj
HashCalc:
Plain Text:-
Krunal Bhardwaj
Key:-Krun@l
![Page 24: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/24.jpg)
Information Security VICT CE 2014-15 21
©Krunal Bhardwaj
Practical – 7
AIM : Installation and configuration of Active directory on server 2008.
To Installation of Active directory on server 2008, the required steps are given
below.
Step-1:- First we need to let the server know, which role it is going to be perform. Open the
Add roles of Initial Configuration Tasks of the server 2008.
Step-2:- Go to Server Roles and select the Active Directory Domain Services and click on
to the Next button.
![Page 25: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/25.jpg)
Information Security VICT CE 2014-15 22
©Krunal Bhardwaj
Step-3:-With Clicking Three times of Next button the ADS Installation Process will be
start. After Installation the Message will be displayed as “Installation Succeeded”.
Step-4:- After that go to run and type command as “dcpromo”, The Active Directory
Domain Service Installation Wizard will be open and select the Use advanced mode
installation and click on to Next button.
The Installer will check the Os Compatibility of the system and click on to the Next button.
![Page 26: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/26.jpg)
Information Security VICT CE 2014-15 23
©Krunal Bhardwaj
Step-5:-After that Choose a Deployment Configuration will be open and select the Create a
new domain in a new forest, click on to the Next button.
Step-6:-After that Give the FQDN (Fully Qualified Domain Name) click on to the Next
button.
Server will check the same forest is available or not in to the server. Provide a Domain
NetBIOS name click on to the Next button.
![Page 27: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/27.jpg)
Information Security VICT CE 2014-15 24
©Krunal Bhardwaj
Step-7:-Set the Forest Functional Level of the Server 2008 click on to the Next button.
Select The Global catalog click on to the Next button.
Step-8:-Select the Location of Database, Log Files Folder and SYSVOL folder click on
to the Next button.
Give the Password of the Server click on to the next button and provide us to all summary
of the ADS click on to the Next Export settings button otherwise click on to the Next
button.
![Page 28: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/28.jpg)
Information Security VICT CE 2014-15 25
©Krunal Bhardwaj
Step-9:-Configures the Active Domain Service of the server 2008 and Installation is
Completed.
Click on to the Finish button. And Restart the System.
![Page 29: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/29.jpg)
Information Security VICT CE 2014-15 26
©Krunal Bhardwaj
Practical – 8
AIM : Connect client computer to the active directory domain and login using
users created in active directory.
On Server computer Login from administrative account and open Active directory users and
computers.
Right click on Users folder and select User form New options
![Page 30: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/30.jpg)
Information Security VICT CE 2014-15 27
©Krunal Bhardwaj
In open window fill the user information and click on next
On password screen give password and remove tick mark from User must change password
at next login
![Page 31: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/31.jpg)
Information Security VICT CE 2014-15 28
©Krunal Bhardwaj
On summary screen click on Finish button
Verify that you have successfully created user accounts
![Page 32: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/32.jpg)
Information Security VICT CE 2014-15 29
©Krunal Bhardwaj
Now make this user the member of built in Domain Admins group
User must be show in the Member tab of Domain Admins group's properties
![Page 33: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/33.jpg)
Information Security VICT CE 2014-15 30
©Krunal Bhardwaj
Now create a computer account for client computer. Right click on Computers folder And
select Computer from New options
Give client computer name [ Make sure you give exact same name which you have on client
computer, Check it before giving here on client computer ]
![Page 34: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/34.jpg)
Information Security VICT CE 2014-15 31
©Krunal Bhardwaj
On managed screen Do not check on This is a managed computer Click on next
On next screen click on finish
![Page 35: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/35.jpg)
Information Security VICT CE 2014-15 32
©Krunal Bhardwaj
Next step is to grant the access of add client in domain. To do this open domain controller
security policy
In left pane expand the local polices. In local polices select User Rights Assignment and in
right pane double click on Add workstation to domain
![Page 36: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/36.jpg)
Information Security VICT CE 2014-15 33
©Krunal Bhardwaj
Now add administrators [group], administrator [Account], and Vinita[ User which you want
to grant the access]
Now refresh the group policy by running GPUPDATE commands in run
We have completed all necessary steps on server in our next article we will see how to use
this account to make client
![Page 37: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/37.jpg)
Information Security VICT CE 2014-15 34
©Krunal Bhardwaj
Practical – 9
AIM : Implement https (Secure http) on server 2008.
Process of implementing https will do in four steps:
1. Create the Certificate Signing Request
2. Install the Certificate
3. Bind the Certificate to a website
4. Install any Intermediate Certificates
1. Create the Certificate Signing Request:
Step1:- The first step in ordering an SSL certificate is generating a Certificate Signing
Request. This is very easy to do in IIS7 using the following instructions.
Step2:-Click here to hide or show the images.
Step3:-Click on the Start menu, go to Administrative Tools, and click on Internet
Information Services (IIS) Manager.
![Page 38: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/38.jpg)
Information Security VICT CE 2014-15 35
©Krunal Bhardwaj
Step4:-Click on the name of the server in the Connections column on the left. Double-click
on Server Certificates.
In the Actions column on the right, click on Create Certificate Request...
![Page 39: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/39.jpg)
Information Security VICT CE 2014-15 36
©Krunal Bhardwaj
Step5:-Enter all of the following information about your company and the domain you are
securing and then click Next.
Step6:- Leave the default Cryptographic Service Provider. Increase the Bit length to 2048
bit or higher. Click Next.
![Page 40: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/40.jpg)
Information Security VICT CE 2014-15 37
©Krunal Bhardwaj
Step7:- Click the button with the three dots and enter a location and filename where you
want to save the CSR file. Click Finish.
Once you have generated a CSR you can use it to order the certificate from a certificate
authority. If you don't already have a favorite, you can compare SSL features from each
provider using our SSL Wizard or by comparing cheap SSL certificates, Wildcard
Certificates, or EV certificates. Once you paste the contents of the CSR and complete the
ordering process, your order is validated, and you will receive the SSL certificate file.
![Page 41: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/41.jpg)
Information Security VICT CE 2014-15 38
©Krunal Bhardwaj
2. Install the Certificate:
Step1:-Click on the Start menu, go to Administrative Tools, and click on Internet
Information Services (IIS) Manager.
Step2:-Click on the name of the server in the Connections column on the left. Double-click
on Server Certificates.
Step3:-In the Actions column on the right, click on Complete Certificate Request...
![Page 42: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/42.jpg)
Information Security VICT CE 2014-15 39
©Krunal Bhardwaj
Step4:-Click the button with the three dots and select the server certificate that you received
from the certificate authority. If the certificate doesn't have a .cer file extension, select to
view all types. Enter any friendly name you want so you can keep track of the certificate on
this server. Click OK.
Step5:- If successful, you will see your newly installed certificate in the list. If you receive
an error stating that the request or private key cannot be found, make sure you are using the
correct certificate and that you are installing it to the same server that you generated the CSR
on. If you are sure of those two things, you may just need to create a new Certificate Request
and reissue/replace the certificate. Contact your certificate authority if you have problems
with this.
![Page 43: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/43.jpg)
Information Security VICT CE 2014-15 40
©Krunal Bhardwaj
3. Bind the Certificate to a website:
Step1:-In the Connections column on the left, expand the sites folder and click on the
website that you want to bind the certificate to. Click on Bindings... in the right column.
Step2:- Click on the Add... button.
![Page 44: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/44.jpg)
Information Security VICT CE 2014-15 41
©Krunal Bhardwaj
Step3:-Change the Type to https and then select the SSL certificate that you just installed. Click
OK.
1. You will now see the binding for port 443 listed. Click Close.
![Page 45: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/45.jpg)
Information Security VICT CE 2014-15 42
©Krunal Bhardwaj
4. Install any Intermediate Certificates
Step1:-Most SSL providers issue server certificates off of an Intermediate certificate so you
will need to install this Intermediate certificate to the server as well or your visitors will
receive a Certificate Not Trusted Error. You can install each Intermediate certificate
(sometimes there is more than one) using these instructions:
1. Download the intermediate certificate to a folder on the server.
2. Double click the certificate to open the certificate details.
3. At the bottom of the General tab, click the Install Certificate button to start the
certificate import wizard. Click Next.
Step2:-Select Place all certificates in the following store and click Browse.
![Page 46: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/46.jpg)
Information Security VICT CE 2014-15 43
©Krunal Bhardwaj
Step3:- Check the Show physical stores checkbox, then expand the Intermediate
Certification Authorities folder, select the Local Computer folder beneath it.
Click OK. Click Next, then Finish to finish installing the intermediate certificate.
![Page 47: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/47.jpg)
Information Security VICT CE 2014-15 44
©Krunal Bhardwaj
Practical – 10
AIM : Configure FTP server with IPsec.
Process will complete in two different steps :
1. First we enable or say configure FTP server
2. Configuring IPsec Policies
1. First we enable or say configure FTP server :
Open Server Manager, go to Roles and click “Add Roles” .
![Page 48: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/48.jpg)
Information Security VICT CE 2014-15 45
©Krunal Bhardwaj
In the Add Role Wizard, select Web Server (IIS) role to install .
![Page 49: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/49.jpg)
Information Security VICT CE 2014-15 46
©Krunal Bhardwaj
Click Next until you reach Select Role Services page, leave the default and check FTP
Server, FTP Service and FTP Extensibility at the bottom. Click Next, follow the wizard and
finish the role installation.
![Page 50: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/50.jpg)
Information Security VICT CE 2014-15 47
©Krunal Bhardwaj
Now open IIS Manager from Start > Administrative Tools, expand the server, right click
Sites, and click Add FTP Site, give it a site name and configure the physical path as needed.
![Page 51: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/51.jpg)
Information Security VICT CE 2014-15 48
©Krunal Bhardwaj
Configure Binding and SSL. In our case, we’d like to bind to all unassigned IP addresses and do not
use SSL.
![Page 52: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/52.jpg)
Information Security VICT CE 2014-15 49
©Krunal Bhardwaj
Enable Basic Authentication and configure authorization. In our case I’ll start with allowing
All users both Read and Write permission as long as all users on the server are password
protected.
![Page 53: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/53.jpg)
Information Security VICT CE 2014-15 50
©Krunal Bhardwaj
Click Finish to finish the configuration.
Open Windows Firewall with Advanced Security from Start > Administrative Tools, go to
Inbound Rules in the left pane, and create a new rule by clicking New Rule in the Action
Pane, select Port and click next.
![Page 54: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/54.jpg)
Information Security VICT CE 2014-15 51
©Krunal Bhardwaj
Apply this rule to TCP port 21, and click
Next
Keep the default configure for the rest of steps to allow the connection and apply it to all
profiles, name the rule and finish the wizard.
![Page 55: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/55.jpg)
Information Security VICT CE 2014-15 52
©Krunal Bhardwaj
2. Configuring IPSec Policies:
Open Active Directory Users & Computers. Right-click the domain (or an OU if you want to
only configure a specific set of computers). Choose Properties.
![Page 56: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/56.jpg)
Information Security VICT CE 2014-15 53
©Krunal Bhardwaj
In the Properties window click the Group Policy tab. Click New to configure a new GPO (if
you don't have one set for that OU already). Give it a descriptive name, such as Secure
Services.
Click Edit to edit the GPO.
Navigate to Computer Settings > Windows Settings > Security Settings > IP Security Policies
on Active Directory. You can now manually configure the IPSec Policy.
![Page 57: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/57.jpg)
Information Security VICT CE 2014-15 54
©Krunal Bhardwaj
Or, if already configured, import it as an .IPSEC file.
![Page 58: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/58.jpg)
Information Security VICT CE 2014-15 55
©Krunal Bhardwaj
After the new IPSec Policy is in place, right-click it and select
Assign.
In order for the changes to take place, either reboot the client computers or refresh their
computer policy.
![Page 59: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/59.jpg)
Information Security VICT CE 2014-15 56
©Krunal Bhardwaj
Practical – 11
AIM : Implement Brute force attack.
Brute-Force Attacks:
Brute-force attacks are fairly simple to understand, but difficult to protect against.
Encryption is math, and as computers become faster at math, they become faster at trying all
the solutions and seeing which one fits.
These attacks can be used against any type of encryption, with varying degrees of
success. Brute-force attacks become faster and more effective with each passing day as
newer, faster computer hardware is released.
Brute-Force Basics
Brute-force attacks are simple to understand. An attacker has an encrypted file say,
your LastPass or KeePass password database. They know that this file contains data they
want to see, and they know that there’s an encryption key that unlocks it. To decrypt it, they
can begin to try every single possible password and see if that results in a decrypted file.
They do this automatically with a computer program, so the speed at which someone
can brute-force encryption increases as available computer hardware becomes faster and
faster, capable of doing more calculations per second. The brute-force attack would likely
start at one-digit passwords before moving to two-digit passwords and so on, trying all
possible combinations until one works.
A “dictionary attack” is similar and tries words in a dictionary or a list of common
passwords instead of all possible passwords. This can be very effective, as many people use
such weak and common passwords.
Why Attackers Can’t Brute-Force Web Services
There’s a difference between online and offline brute-force attacks. For example, if an
attacker wants to brute-force their way into your Gmail account, they can begin to try every
single possible password — but Google will quickly cut them off. Services that provide
access to such accounts will throttle access attempts and ban IP addresses that attempt to log
in so many times. Thus, an attack against an online service wouldn’t work too well because
very few attempts can be made before the attack would be halted.
For example, after a few failed login attempts, Gmail will show you a CATPCHA
image to verify you aren’t a computer automatically trying passwords. They’ll likely stop
your login attempts completely if you managed to continue for long enough.
![Page 60: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/60.jpg)
Information Security VICT CE 2014-15 57
©Krunal Bhardwaj
On the other hand, let’s say an attacker snagged an encrypted file from your computer
or managed to compromise an online service and download such encrypted files. The attacker
now has the encrypted data on their own hardware and can try as many passwords as they
want at their leisure. If they have access to the encrypted data, there’s no way to prevent them
from trying a large number of passwords in a short period of time. Even if you’re using
strong encryption, it’s to your benefit to keep your data safe and ensure others can’t access it.
Hashing
Strong hashing algorithms can slow down brute-force attacks. Essentially, hashing
algorithms perform additional mathematical work on a password before storing a value
derived from the password on disk. If a slower hashing algorithm is used, it will require
thousands of times as much mathematical work to try each password and dramatically slow
down brute-force attacks. However, the more work required, the more work a server or other
computer has to do each time as user logs in with their password. Software must balance
resilience against brute-force attacks with resource usage.
Brute-Force Speed
Speed all depends on hardware. Intelligence agencies may build specialized hardware
just for brute-force attacks, just as Bit coin miners build their own specialized hardware
optimized for Bit coin mining. When it comes to consumer hardware, the most effective type
of hardware for brute-force attacks is a graphics card (GPU). As it’s easy to try many
different encryption keys at once, many graphics cards running in parallel are ideal.
![Page 61: Information Security(160702) - · PDF filecourse in Information Security (160702) ... 3 Write a Program to implement a RSA Algorithm. 7 / /15 4 ... AIM : Write a Program to implement](https://reader031.vdocuments.mx/reader031/viewer/2022030502/5aae59027f8b9a22118be1d5/html5/thumbnails/61.jpg)
Information Security VICT CE 2014-15 58
©Krunal Bhardwaj
At the end of 2012, Ars Technica reported that a 25-GPU cluster could crack every
Windows password under 8 characters in less than six hours. The NTLM algorithm Microsoft
used just wasn’t resilient enough. However, when NTLM was created, it would have taken
much longer to try all these passwords. This wasn’t considered enough of a threat for
Microsoft to make the encryption stronger.
Speed is increasing, and in a few decades we may discover that even the strongest
cryptographic algorithms and encryption keys we use today can be quickly cracked by
quantum computers or whatever other hardware we’re using in the future.
Protecting Your Data from Brute-Force Attacks
There’s no way to protect you completely. It’s impossible to say just how fast computer
hardware will get and whether any of the encryption algorithms we use today have
weaknesses that will be discovered and exploited in the future. However, here are the basics:
Keep your encrypted data safe where attackers can’t get access to it. Once they have your data copied to their hardware, they can try brute-force attacks against it at their leisure.
If you run any service that accepts logins over the Internet, ensure that it limits login attempts and blocks people who attempt to log in with many different passwords in a short period of time. Server software is generally set to do this out of the box, as it’s a good security practice.
Use strong encryption algorithms, such as SHA-512. Ensure you’re not using old encryption algorithms with known weaknesses that are easy to crack.
Use long, secure passwords. All the encryption technology in the world isn’t going to help if you’re using “password” or the ever-popular “hunter2″.