MD5 sum : 5ff1e5c6d12b16da6d31f7852065f364
SHA1 : 75d21d0b9febada4a7fdbeb018650975cb44a712sha
b. MD5sum and SHA1 hash for the modifi ed example.txt file;
MD5 Sum: 565d01aeb8b3c1592a76d17eec836c39
SHA1: 5bdc4dad0588e617b8e425f959114016962ee58c
c. Screen capture of the encrypted file (cleartext.txt.gpg);
d. Screen capture of the decrypted file (gpg –d cleartext.txt.gpg); (Had a problem with this)
e. Screen capture of the directory listing showing student.pub; f. Screen capture of the directory listing showing instructor.pub;
ISSC362 Week 1 Lab #2:
Implement Hashing and Encryption for Secure Communications
Instructor Name: ________________
Lab Assessment Questions
1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
The Hash Value is set to a exactly the value so once it is altered the values will change to the alteration.
2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end?
Because the example.txt file is the same. If they were different then the two has values would be as well.
3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?
Public Key Infrastructure, Digital Signature
4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?
Cyptography and Digital Signatures
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
MD5 provides 128