Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
laboratory.doc
Скачиваний:
6
Добавлен:
01.07.2025
Размер:
5.68 Mб
Скачать

3. The order of execution of work

SOFTWARE INSTALLATION.

 Insta

llation Crypton API

Go to the directory and run CryptonAPI CRYPTONAPI.EXE.

Next, create a directory in CryptonAPI run install.exe installer. The parameters of the installation select the device Crypton-4K / 16, it is the default.  Installation Crypton emulator Go to the directory Emulator and run the installation program install.exe. Setting Ancud Software:Copy the files and floppy gk.db3 uz.db3, which are in diriktorii Emulator. GC (main key

- Gk.db3 file) and ultrasound (replacement unit - file uz.db3) - key elements used by the emulator to perform cryptographic functions and must be loaded into the simulator prior to performing any cryptographic functions.

Next, click Start -> Programs -> Ancund Software -> Cripton API-> run "driver support DOS configuration" and choose "Use Driver" driver simulator. (Picture 1)

Figure1. After that, insert the disk, click Start -> Programs -> Ancund Software -> Crypton Emulator run the "Download keys" (Figure 2)

Figure2. After that you are ready to perform the encryption and decryption of information. Test the encryption function can be run in the Start Menu -> Programs -> Ancund Software -> Cripton API-> "Crypton API function testing program" (Figure 3)

Figure 3.

After running "Crypton API function testing program" Driver on the menu -> Open, select the "Driver Emulator" (Figure 4)

  • fail Key2.exe

Then, in the "Encryption", you can encrypt and decrypt a short message.  Installation Center key generation (STG). Set STG (diKey.exe) running Key2.exe file  Installation dipost package. Install dipost running setup.exe from the folder dipost

4. Contents of the report

The report discusses how to do the work. Give values of generated keys. Bring the results of tests of the device.

  1. Test Questions

1. What file contains gk

2.What does uz file

3. Appointment of the master key

4. Describe the key hierarchy

List of recommended references

  1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.

  2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.

  3. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288

  4. Brynjolfsson, E. and A. Saunders (2010). Wired for Innovation: How Information Technology Is Reshaping the Economy. Cambridge, MA: MIT Press

  5. Kretschmer, T. (2012), "Information and Communication Technologies and Productivity Growth: A Survey of the Literature", OECD Digital Economy Papers, No. 195, OECD Publishing.

Laboratory work № 5.

Key generation and cryptographic information in the client email program DiPost is software jobs Centers users of information and communication services DIONYSUS (hereinafter simply Centres) and other systems that support SMTP and POP3. DiPost allows the user to prepare and store e-mail correspondence, conduct sessions of bilateral exchange of information with the Centers for different types of communication channels. When connecting the phone to the Center u1074 exchange of information is carried out automatically: all the data prepared by the subscriber to be sent, forwarded to the Centre, and the data that came in the subscriber's address since his last session with the Centre sent to the user's PC. Upon completion of the data exchange session, the user can engage in processing the information received. In addition to the usual functions of e-mail systems in DiPost the following features. Working with multiple mailboxes, it allows you to organize DiPost for several subscriber mailboxes. This capability allows the user registered in the different centers, post split flows. One mailbox (system) is automatically created, and the subsequent need to be created manually by the user. Work on communication lines of various types DiPost allows you to connect to the Centre for telephone lines (dial-up and leased) via a modem, via a local network, working on protocols IPX, TCP / IP, SMTP and POP3, on the switched network using a PPP or SLIP protocols. Automatic delivery of mail in DiPost implemented automatic exchange of information with Center mode after a specified time interval. Automatic preparation of outgoing mail in DiPost implemented automatic file conversion mode in e-mail messages and sending them to the Centre for initiating the data exchange with the Centre. Different storage formats of mail DiPost supports for storing e-mail messages (emails, letters, files) 3 mail format - Dionysos, MIME, and UUENCODE. The ability to store any messages Dionysus format gives the user a convenient means to view and edit text messages. The automatic format conversion for incoming e-mail inbox in DiPost can search emails in MIME format and auto-convert them to the format of Dionysus. If necessary, from the automatic format conversion can be dispensed with.

Support DiPost notification allows an order notification for outgoing mail and to generate a read receipt of incoming mail subscriber

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]