Preview

ISSC362 Lab 2 Assessment

Good Essays
Open Document
Open Document
492 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC362 Lab 2 Assessment
MD5sum and SHA1 hash for the original example.txt file;
MD5 sum : 5ff1e5c6d12b16da6d31f7852065f364
SHA1 : 75d21d0b9febada4a7fdbeb018650975cb44a712sha

b. MD5sum and SHA1 hash for the modifi ed example.txt file;
MD5 Sum: 565d01aeb8b3c1592a76d17eec836c39
SHA1: 5bdc4dad0588e617b8e425f959114016962ee58c

c. Screen capture of the encrypted file (cleartext.txt.gpg);

d. Screen capture of the decrypted file (gpg –d cleartext.txt.gpg); (Had a problem with this)

e. Screen capture of the directory listing showing student.pub; f. Screen capture of the directory listing showing instructor.pub;

ISSC362 Week 1 Lab #2:
Implement Hashing and Encryption for Secure Communications
Instructor Name: ________________

Lab Assessment Questions

1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.
The Hash Value is set to a exactly the value so once it is altered the values will change to the alteration.

2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end?
Because the example.txt file is the same. If they were different then the two has values would be as well.

3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?
Public Key Infrastructure, Digital Signature

4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?
Cyptography and Digital Signatures

5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
MD5 provides 128

You May Also Find These Documents Helpful

  • Good Essays

    One of the most prevalent and effective systems used within the Marine Corps is the human resources system known as Marine Online (MOL). MOL was created to track Marines annual training, allow special requests such as leave, liberty, temporary duty assignments, personal time away from duty. MOL also gives Marines the ability to track carrier progression through annual reporting and rewards that are posted. The system includes promotion tracking and allows one to calculate physical training scores such as physical fitness training scores and combat fitness-training scores. The system allows Marines to track pay and leave in incremental amounts allowing one to view pay 15 days prior to being paid. The need for the system has been ever present and before its implementation everything was stored on paper and word of mouth. The system has helped the Corps as a whole because it creates a platform for many different types of data to be stored and calculates data automatically allowing data to be requested at a moment notice.…

    • 1004 Words
    • 5 Pages
    Good Essays
  • Good Essays

    We can see that this checksum is as same as the one of the original file. That means the file has not been altered after encryption and decryption.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    4 T | An update anomaly occurs when you have to update the same data in multiple places.…

    • 313 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In addition to the already existing security layers, there should be an added layer specifically for incoming and outgoing emails.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? Digital Signature…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    precisely the same every time, so there is no room for human error. The software can run this test…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Experiment 4a

    • 440 Words
    • 2 Pages

    4) Difference in answer could be the different initial masses of zinc, how accurate on measuring the hydrochloric acid, and calculation errors.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    The two types of encryption supported by GPG are MD5 and Sha1 which serve as hashing encryptions.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Problems1

    • 605 Words
    • 2 Pages

    of the modified file and an explanation of your changes.) Use your new file to graph the…

    • 605 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Linux Chapter 2

    • 288 Words
    • 2 Pages

    9. What is SHA1? How does it work to ensure that an ISO image file you download is correct?…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    change is made to the module and all other test plans get the change. One limitation of the…

    • 355 Words
    • 2 Pages
    Satisfactory Essays

Related Topics