Using Public Key Encryption to Secure Messages

CompTIA Security+ (SY601) Domain
Domain 3.0: Implementation

CompTIA Security+ (SY601) Objective Mapping
Objective 3.9: Given a scenario, implement public key infrastructure

CEH Exam Domains:
Domain 1: Background
Domain 3: Security
Domain 4: Tools/Systems/Programs
Domain 5: Procedures/Methodologies

CEH Objective Mapping:
Objective 1.3 Information Security Technologies
Objective 3.3: Information Security Attack Prevention
Objective 4.3: Information Security Tools
Objective 5.1 Information Security Procedures

Overview

In this lab, you will use encryption to protect data and sensitive information. Data protection is imperative for companies and organizations. Encryption is used as a part of layered security architecture in an organization’s networks.

outcomes:

In this lab, you will learn to:

  1. Use PKI to generate a certificate for a student and administrator.
  2. Use PKI to encrypt and decrypt a file.

Key terms and descriptions

Social Engineering Toolkit
Tools that can be used by an attacker to exploit victims.
Kleopatra
A certificate manager and a universal crypto graphical user interface (GUI). Kleopatra supports management of X.509 and OpenPGP certificates in the GpgSM and GPG keyboxes and for retrieving certificates from LDAP and other certificate servers.
Certificate
An electronic document used to authenticate ownership of a public key. The certificate includes information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate.
Opera
A free browser and e-mail client.
Public key encryption
A cryptographic system that uses two keys—a public key known to everyone and a private key known only to the recipient of the message. These keys are related in that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.