Professional Documents
Culture Documents
Purpose
Apparatus
The following tools can be used in this experiment:
Overview
Stage 1: Setup the platform on oracle virtual box running Ubuntu Linux
operating system. You should deploy two machines, one will be acting as the
client and the other as the server.
During this experiment, you will learn operating systems and Linux foundation using
the command line or terminal. Commands that you can test include (ping, ip,
ifconfig, etc). This will lead to gaining a basic understanding of what they do and
what they can be used for. It is essential to understand what these commands do
because they allow you to inspect a network and its issues as well as knowing how
to go about fixing those issues.
Stage 2: In this stage, you will create two programs using Python version
3.7. One program is to run as a client service and the other as the server. You
need to test the communication between both and you should be able to send
messages and files.
Next, you need to start learning more about network programming. You will create
sockets in Python which will be used as an endpoint for communication between
two machines on an internal network, in this case you will use two Ubuntu machines
one acting as the server and the other one will be acting as the client for further
testing purposes.
In the second scenario, you will experiment using the same socket communication.
However, this time you will implement symmetric encryption such as AES and
asymmetric encryption such as RSA. AES requires both parties to have access to the
same private key otherwise encryption and decryption will not be possible, whereas
RSA generates a private and public key which is much more convenient. It is
recommended that RSA key strength must be 2048 bits or better to ensure a strong
encryption method which is harder to crack should an attacker try to brute force it.
As for signatures it is recommended to use SHA-256 or better. With RSA you will
study how a private key is used to key a public key which anyone can see, but only
the private key is able to encrypt and decrypt data. This provides a stronger method
than AES because of its security and efficiency.