Advanced Encryption Package Lab

FacebookTwitterGoogle+LinkedInEmail
Description
The Advanced Encryption Package lab demonstrates use of an advanced encryption analysis components and how to use then to dig deeper in your analysis.  For example, you’ll observe creation of a password protected text file and see how the Advanced Encryption Package tool rates a newly assigned password. In the Advanced Encryption Package lab, you’ll also learn the advantages and disadvantages in the integrity principle vs. confidentiality principle and how those differences impact Symmetric vs. Asymmetric encryption. [toggle_content title="Transcript"] Ok, so let’s talk about encryption. There's a little cool package that I like to use every now and again, called Advanced Encryption Package. You have a trial version, but you can also get the actual full, paid version of it. But I like it just because it gives you the basic overview of encryption, gives you a variety of algorithms to choose from, which are down here in the algorithm list, and things like that. So what we're going to do is basically -- I've created a directory and a file called 'encryptme.txt' that's sitting on my hard drive. And what we're going to do is, we're going to set up a password, and I'm just going to call it 'password'. It'll rate the strength of it. So I can do this symmetrically, or you can see there's a public key component here, which is an asymmetric component. I can choose the algorithm. Now this is nice, because you can actually see a variety of the symmetric algorithms. So, if we just back up and look at principles for a second, remember, in the integrity world, we want to detect to see if something has been changed, modified or altered. But in the confidentiality world, we purposely do want to change things. In fact, we want to change things from plain text, the stuff that we can see, to cipher text, the stuff that we can't see. And so, any symmetric algorithm, it basically works like a padlock. You basically put in a password, and it changes plain text into cipher text forwards and backwards, and that's it. All keys in the symmetric world are private keys. So there's a little saying that we have in class, where we just rattle off all of the symmetric algorithms. So it's "A-D-3 guys had an idea to cast out the rod to fish for Blowfish, but instead they received Serpents in the rain". So let me go through that a little slower, and then let me show you that basically in a program or tool like this. So 'A', 'A' for AES, and you would look on this list for AES. Now, in fact Rijndael is based off of AES, so this can work in AES 256 bit mode. 'D' is for DES, '3 guys' for Triple-DES, 'had an idea' and you could see if Idea is in this list, doesn't look like that it is, 'to cast' - Cast, right here, which is a 256 version of Cast. 'To cast out the rod to fish', so you can see if Twofish is here, and there it is, 'for Blowfish', there's Blowfish. 'But instead they received', received is the Rivest cipher, so specifically have Rivest 2, but there's 3, 4, 5, 6, et cetera. 'Serpents', Serpents is in the list, somewhere. Here it is at the bottom. 'In the rain', which again is Rijndael or AES. And there's a few others that I didn't cover - Mars, Skipjack, which is you know, relatively outdated. Square, Shark, Ghost, Three-way, Safer, T-Diamond. So they are others if you want to get the idea. One of the most testable things about these algorithms is the bit size, so it is helpful to basically see those here, for example Skipjack is 80. I'm looking for unique trends and patterns here. Blowfish is 448, Triple-DES is basically 192 or 168, depending on how you want to add it up, with or without parity. DES is normally 56, in this case they're running 128 bit version of that. AES actually comes in variable sizes, this in two, so it's 128,192 and 256, so this program implements the 256 version, et cetera, et cetera, et cetera. So you basically can pick any algorithm you want. All of these are effectively going to work exactly the same. So in this case we'll use Blowfish, just because it's not exactly popular on Windows, but it is in the open source world and things like that. And then basically encrypt the file, and then 'encrypt now'. "Error - the second password does not match the first". Oops. Go ahead and put in your password, I just put in the word 'password', and then go ahead and encrypt the file, and now you can see 'encryptme.txt.aep' and that's the one. So now if I want to decrypt that file -- oh actually, before we do that, let’s go actually see the actual file on the hard drive. So I have that in a folder called 'Leo' and if I try to open this or manipulate this, it actually comes up right with the password right here. So to decrypt the file, we basically just put in our password - p-a-s-s-w-o-r-d, select 'decrypt' and it says 'hey, it already exists. Do you want to override it'? And we can select 'yes' here, just to prove that it is, in fact, going to decrypt it. And you can see the encrypted contents, right? I just made something simple here, I just put 'Hi Mom'. But it really doesn't matter the size, because I just basically proved that it works. So there's a couple of different reasons for using a tool like this. One, it actually gets you a little bit more fluent with the algorithms, ok? Please note - you don't see any MD5, you don't see any SHA, Tiger, Whirlpool, cyclic redundancy checks, HAVAL, no integrity algorithms are in here. You also do not see any asymmetric algorithms in the symmetric list, so it gets you pretty familiar with basically how symmetric algorithms work. Now if you wanted to do public key algorithms, you can basically import the public key and, now the cool part about this is you don't need the private key, only the decrypter or the receiver need the private key. So you've just got to import somebody else's public key and then you can go ahead and encrypt it, and send the file to somebody else. And it does have, like a PKI key manager, basically, and the equivalent of the digital keyring here, to basically keep a whole variety of, you know, the public keys that you've imported, ok? So that's basically how you can use it. To encrypt and decrypt files. You can then zip it up, email, delete the files, et cetera, et cetera, et cetera. You can do directories, you can apply filters if you want to find things. The only thing I don't like about this tool, is in the trial version you have this little pop-up here, and you only get 30 days to evaluate it. [/toggle_content]
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel