StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Sciences and Information Technology - Assignment Example

Cite this document
Summary
From the paper "Computer Sciences and Information Technology" it is clear that the S-Tool Application is software that helps to hide information in an image. A Key, which may be a set of alphabets, numbers or any combination of these, can be used to encrypt and decrypt messages into the image…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Computer Sciences and Information Technology
Read Text Preview

Extract of sample "Computer Sciences and Information Technology"

Download file to see previous pages

The encrypted message is not visible in plain sight but can be retrieved with the use of the same application, thus it becomes very easy to hide confidential data.
The process of encryption and decryption of message into an image is demonstrated in the following steps:
1. A new folder is created onto the desktop and named Peek-A-Boo.
2. All files of the S-Tool application are copied into this folder.
3. Now, the image file named ‘marbles.bmp’ file is downloaded in the Peek-A-Boo folder. This image should be used for demonstration purposes.
4. A .txt file is created with the notepad. It contains only one sentence stating “Don’t forget your lunch.” and then renamed as message.txt and saved into the Peek-A-Boo folder.
5. Next, from the Peek-A-Boo folder the S-Tool.exe file is opened by double-clicking on it.
6. The S-Tool dialog box appears as below:
7. At first the marble.bmp image file is dragged into the S-Tool window.

8. Then the.txt file is dragged over the image file into the S-Tool application. A dialog box appears on the screen asking for a passphrase, which will be used for both hiding and retrieving the information.

9. The passphrase used for this encryption process is given as ‘pass’ and the Encryption Algorithm is set to ‘IDEA’ from the drop-down box.

10. Within a few seconds after pressing ok, a new window entitled ‘hidden data’ opens up with the image. This image contains the .txt file within itself but cannot be differentiated in plain sight.

11. Right-click on the hidden data image and select the ‘save as’ option to select a destination folder. The hidden data image is then saved as ‘hidden-message.bmp’ into the Peek-A-Boo folder.
12. Then all the S-Tool applications and Peek-A-Boo folder are closed. The information is stored in the hidden-message image file.
13. Now, pretending as our own conspirators, we will try to retrieve the information from the image file.
14. The S-Tool application is again opened from the Peek-A-Boo folder and the hidden-message image file is dragged into it. This is how it shows:


15. Right-click on the image > Select ‘Reveal’. Again the dialog appears requesting to give the passphrase used for encryption.

16. The passphrase ‘pass’ is given the same as before and press ok.

17. A small window appears on the screen specifying the text file that is hidden in the image.
19. By double-clicking on the “message-revealed.txt’ file, the message can be viewed which is exactly the same as the original one.
Part B
Soylent Green –the case of Computer Forensic Mystery
Solomon Roth needs to use the S-Tool to decrypt the information about the murder mystery of New York Soylent's board member William R. Simonson. The information is saved in the image files of Thorn’s computer files but the passphrase is not yet found. The passphrase can be recovered from http://www.fourmilab.ch/javascrypt/javascrypt.html by using the ciphertext and the encryption key. The process is given below:

1. Open the link http://www.fourmilab.ch/javascrypt/javascrypt.html
2. Select the option Encryption/decryption utility from the javaScript components provided on the page. The new page appears as below.
3. The Ciphertext along with the key to be provided in the respective space to retrieve the passphrase and press ‘decrypt’. The passphrase Thorn’ appears on the plain text
4. Thus Sol receives the passphrase to decrypt the message from the images using S-Tool.
The next step is to retrieve the information from the three image files about the murder.
The process is shown in the following steps:

1. Again the S-Tool application is opened.
2. The first image file from the PEEKABOO Evidence folder is dragged into the S-Tool application window.
3. Right-click on the image > select ‘Reveal’. The dialog box appears on the screen asking for a passphrase.
4. The passphrase ‘Thorn’ is provided and then ’ok’. A small window appears which mentioned that a .wav file is encrypted in the image.5. The .wav file is then saved in the PEEKABOO folder.
6. When this file is opened, it said “You got to tell then Soylent Green’s people”.
Other images files are clean and do not hold any information within themselves. Thus it is found that the people of Soylent Green are responsible for William R. Simonson’s murder.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 5 Example | Topics and Well Written Essays - 750 words - 1”, n.d.)
Assignment 5 Example | Topics and Well Written Essays - 750 words - 1. Retrieved from https://studentshare.org/information-technology/1654511-assignment-5
(Assignment 5 Example | Topics and Well Written Essays - 750 Words - 1)
Assignment 5 Example | Topics and Well Written Essays - 750 Words - 1. https://studentshare.org/information-technology/1654511-assignment-5.
“Assignment 5 Example | Topics and Well Written Essays - 750 Words - 1”, n.d. https://studentshare.org/information-technology/1654511-assignment-5.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences and Information Technology

Computer Sciences and Information Technology in Humanity

This paper ''Computer Sciences and Information Technology in Humanity'' discusses that the technology has been very essential in human beings' daily lives, typically in many human beings have proved to be more dependent on technology that that they cannot exist without.... Again this machine is very critical in elaborating evolutions in technology.... This piece of machine depicts a real evolution in technology and furthermore, the machine inclines more on the new invention as compared to development of an existing technology....
6 Pages (1500 words) Research Proposal

How Cloud Computing Affects the Accounting World

This can be beneficial to both the students and faculty especially the ones engaged in computer science and information technology courses.... The school can benefit from information technology infrastructure at minimal costs.... Thus, owing to the advantages of cloud computing and advancing in technology, many firms are adopting the system.... Another advantage is that with cloud computing, the school gets to be a part of developing technology....
5 Pages (1250 words) Research Paper

Computer Sciences and Information Technology. User Experience

In order to get information regarding their experiences of using the website, the users are given a website usability form to be filled so that the website of the Phone4u can be evaluated.... This will require acquisition of user opinions and to present analysis of the information to guide the decision on the areas of improvement.... The evaluation will lead to the decision making for the new version of the website based on the information from user response....
9 Pages (2250 words) Essay

Discussion 1 and 2

Jobs in the networking industry are highly competitive therefore it is important that if one Computer Sciences and Information Technology Computer Sciences and Information Technology Part Employment Possibilities in the Networking Area There are a lot of employment opportunities in the networking area.... Some of the job titles related to a job in the area of networking include network administrator, network systems engineer, network service technician, network programmer/analyst and network/information systems....
1 Pages (250 words) Assignment

The Internet Provider ASA

Computer Sciences and Information Technology al affiliation Computer Sciences and Information Technology The moment users in the direct network or firm network desire an access to servers in the DMZ, the most appropriate practice would be enabling the verification of the internet provider's ASA.... Principles of information Security....
1 Pages (250 words) Essay

Comparison of Closed Mobile Ecosystems with the Open One

The author states that the current market share in the United States is on rising where most people are opting to use Open Mobile ecosystem, as they are flexible since they can be used anywhere.... The most developers that have lost in the United States market is the Blackberry.... .... ... ... A closed mobile ecosystem, on the other hand, is one that does not allow its users to have access to wireless networks using mobile devices....
1 Pages (250 words) Assignment

Computer Sciences and Information Technology - Scheduled Installment System

The paper "Computer Sciences and Information Technology - Scheduled Installment System " highlights that with all the functionalities and qualitative features of the two applications, it is evident that Microsoft Dynamic GP stands a better chance than the Scheduled to be selected by organizations.... s Scheduled Installment gives an ordinary system user interface with real time accessibility to all of the properties, Microsoft Dynamics GP gives each user a customized and personal interface, which is task-oriented and with pre-defined, customized roles and information look....
7 Pages (1750 words) Case Study

Planning Stage in Computer Sciences and Information Technology

The paper "Planning Stage in Computer Sciences and Information Technology" explains that before initiation of an IT project it is great to conduct research of the context of the project in terms of will encompass and time for its implementation and collecting data pertaining to project conducting....
14 Pages (3500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us