Please submit the answers to these questions to the assignment on Gradescope.


1) Suppose you want to create private file backups in cloud storage, but you want to attach a short, non-private but authenticated summary of each file to the file. 

a) Why is the authenticated encryption program you completed in part 2 insufficient for this task?

b) How could you accomplish this using a combination of the tools you built today?

c) What would be the ideal cryptographic tool for this problem?


2) Fernet provides a very simple interface for encryption. Look at the authenticated encryption and symmetric encryption documentation in the hazardous materials layer of the cryptography library. What are some inputs and parameters you need to set correctly to use those functions that you didn't need to think about when using Fernet? List at least 2, and for each say how that parameter should be set.


3) 

a) How would you describe the difficulty of this lab? Too easy, easy but not too easy, just right, hard but not too hard, or too hard?

b) What, if any, would you recommend changing in future versions of this lab?

