Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
laboratory.doc
Скачиваний:
6
Добавлен:
01.07.2025
Размер:
5.68 Mб
Скачать

3.The order of execution of work

11. Start dipost program. (Figure 7)

12. In the "Box" menu, select "Mailbox Settings" In the "Email" enter the address, consisting of the initials of the subscriber, in the "key name" enter the caller ID (name of the file in the PRIVATE folder on a floppy disk), check the box opposite fields "sign letters" and "Encrypt letters" DSU for example subscriber (Risunok8)

In "Box" menu, select "cryptosystem Settings", set the parameters corresponding to a given subscriber. (Figure 9).

N ote, it may be necessary to change the name of the file in the floppy disk in the PRIVATE section.

Figure 7

Figure 8

Figure 9

13. In the "Posta", select "Address Book" and recorded it .For example subscriber addresses for the RAS (Figure 10):

Figure 10

We can now send encrypted messages (Figure 11)

If you do not have access to the Internet, then you can simulate the mail agent as follows: Create a user in the pack DSU "Outbox" message, attach any text file, encrypt it (znachёk lock) .Zakryvaem Dipost. Then copy the files from the folder "Dipost \ BOXES \ DSU \ Outbox" folder "Dipost \ BOXES \ RAS \ Inbox". Next, insert the floppy disk with the RAS .Zapuskaem Dipost keys in the RAS mailbox open the folder "Inbox" and decrypt files. Communication session is over. This work is done by 2 students. reporting form - a detailed description of the work done at each step in the electronic document (Microsoft Word).

4.Contents of the report

reporting form - a detailed description of the work done at each step in the electronic document (Microsoft Word). Give the structure of a key diskette. The content of the file public and private keys. 5. Test Questions

1.Describe the key floppy disk structure

2. How to get the private key?

3. How to get the public key?

4. What are the rules of secure document?

5. What basic threats confronts secure document system

Creating a protected document

Objective: To study the principles of «Crypton Word», «Crypton Excel», understand procedures cipher tion / decryption of electronic documents, setting the electronic digital signature (EDS). Methodical instructions to performance of laboratory work:

 Check Novex Stealth key in the LPT port on the rear panel of the system unit. Centre the instrument thread setting emulator Crypton

 Open the MS Word program.

 Create a new electronic document or open any available.

Create a protected document and put the electronic signature. 1.Learn to work on the master encryption keys 2.Read the test program Crypton API application functions 3.Get the skills to work with Crypton Disk Setting emulator made by means of a label "Configuration emulator driver", accessible through the main menu of Windows. With this label program called config-integration emulator "drvsetup.exe", located in the directory of the emulator settings. The main window is shown in Fig. 1:

Pic. 1. The main window of the emulator configuration software

Fig. 1. The main window of the emulator configuration software

This window has three tabs:

1) "On the driver" (see. Fig. 1). This tab contains information about your eq-zemplyare emulator:  installed version of the emulator;

 the operating system used;

 serial number of the emulator.

5. "Current state". This tab provides information about the number of open sessions emulator, t. E., Whether the emulator is currently in use and how many applications are using it. In addition, this tab provides information about the protection status of Copying, of this instance of the emulator. 6. "Civil Code and US" (see. Fig. 2). This tab is used to specify the location of keys ini-socialization emulator, as well as their loading and unloading. Appointment initialization keys and smacking dock work with them are described below. The main window of the configuration software emulator also has the following buttons: 7. "Apply". Writes configuration changes and allows you to continue working with the pro-gramme emulator configuration. 8. "Help". It is background information on the emulator.

Fig. 2. Tab "GC and US 'main window configuration software emulator The only configuration parameter that can be changed with confit-figuration emulator program - is the location of the master key (GK) and the replacement unit (KM). These key elements used by the emulator to perform cryptographic functions and must be for the ship-in emulator prior to performing any cryptographic functions.

To change the location of the GC and US directory tab is "GC and US" configuration software emulator (see. Fig. 2). This tab contains the following additional elements:

  1. Input field for CC location directory and ultrasound.

3 button to select the location of the GC directory and ultrasound using standard dialog boxes (to the right of the directory entry). 4 Button for loading and unloading of the Civil Code and ultrasound. The name of the button is changed depending on whether the emulator is initialized, and may be one of the following: - "Load CC and US" - if the GC and US has not yet uploaded (the emulator is not initialized). Clicking on this button loads a GC and US (the download process is described in detail below). - "Unload CC and US" - if the emulator has already been initialized. In this case, the Civil Code and the ultrasonic keys are unloaded and further work is necessary to initialize the emulator clearly Islands. Keys HA and KM are stored on storage media information in the files "gk.db3" and "uz.db3" respectively. This version of the emulator allows use as a key media-only removable but supports of information, such as a floppy disk or a smart card. press the button "Sign and encrypt" panel in-TOOLS FOR «Crypton Word» To create a security document. In the Microsoft Word at least one document to be opened. It protects the active document. If Microsoft Word does not contain the active document, an error message bu-children. In addition, to create a secure document program will require download of the Civil Code and the ultrasonic keys. To do this, insert the floppy disk with stored thereon keys GK and US (the teacher). In after this dialog box appears with a proposal to remove the carrier. Warning: Never leave the vehicle with CC and US in the drive!

If the current document is not saved, you will receive a message with a proposal preserves-tion document. Clicking "Cancel" in the window cancels the operation of creating a protected document. Clicking "Yes" the document is saved, if you select the button "No" to the saving-Document does not occur; and in fact, and in another case, the current document is closed, and then displays a window for creating a protected document (see. Fig. 1).

To create a security document, follow these steps:

1) Specify the file name to record it.

2) Select the location of the catalog file to be created.

3) Select the desired subscribers with the mouse and the «Ctrl» key and «Shift». Isolation bony-ing in the same manner as the selection of objects into the Windows Explorer program. 4) Click "OK". Along with encryption on the files will be installed an electronic signature for subsequent monitoring of the integrity and authorship of a document. To be signed only a copy of the original document in the computer's memory, the original document is not changed. After pressing the "OK" button to begin the process of creating a protected document. This displays a screen that shows the progress of the process. progress window contains the button "Cancel", clicking on which you can cancel the process. This displays a confirmation cancel.

Laboratory work №1

CREATE A GOOGLE ACCOUNT TO USE GOOGLE DOCS. THE USE OF MOBILE TECHNOLOGY TO ACCESS THE INFORMATION, GPS NAVIGATORS, GSM ALARM.

Create your Google Account →

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]