Applying Encryption and Hashing Algorithms for Secure Communications
Overview
In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.
Lab Assessment Questions & Answers
1. Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The hash values will change when the data is modifie
2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the example.txt file? What if it were different when you recalculated the hash value at the other end? The MD5sum and SHA1 sum hash values the same every time is because it is from the same content of the file being used by original user.
3. If you want secure e-mail communications without encrypting an e-mail message, what other security countermeasure can you deploy to ensure message integrity? You can deploy to ensure message integrity is by using digital signatures, whether it is encrypted or not,
4. What is the –e switch used for with running the GnuPG command?
B. Encrypt
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. So SHA is more secure.
6. Name the cryptographic algorithms used in this lab. MD5sum and SHA1sum.
7. What do you need if you want to decrypt encrypted messages and files from a trusted sender? Use GPG to encrypt, decrypt, sign and verify files or emails.
8. What is the -d switch used for when running the GnuPG command? C. Decrypt
9. When creating a GnuPG private key, what are ways to create entropy? find * / && find * / && find * / && find * / && find * / && find * /
Part 2~ 6 Lab screen shot
You May Also Find These Documents Helpful
-
Note: the analysis #1 a) and b) will only be demonstrated on the graphs of trial 1 for this report, trial 2-5 have approximately the same results.…
- 508 Words
- 3 Pages
Satisfactory Essays -
Complementary Metal Oxide Semiconductor, or CMOS, is a widely used type of semiconductor. CMOS semiconductors use both NMOS(negative polarity) and PMOS(positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This feature makes them convenient for use in battery-powered devices such as laptops. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and the system setup parameters. To access the CMOS on most computers, press the delete key as the computer is booting.…
- 311 Words
- 2 Pages
Satisfactory Essays -
| LabRepQuiz010 Question MC #7: Which of the following is the best written sentence that includes the information below taken from an article written by Dr. Costanza, but avoids plagiarism?…
- 929 Words
- 4 Pages
Satisfactory Essays -
They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…
- 415 Words
- 1 Page
Satisfactory Essays -
b) Should be in the past tense and passive voice. Remember, you did this investigation earlier in the week. Example: “The instantaneous velocity was calculated by dividing .04 m by the time of the main gate.”, and NOT “I calculate the velocity”.…
- 349 Words
- 2 Pages
Satisfactory Essays -
Unit Five: Lab Assignment #1 1. How does Newton's law apply to a company's brand? Explain, citing at least one example. A= The more massive a brand the more force it need to change its position. 2.…
- 431 Words
- 2 Pages
Satisfactory Essays -
-It was so important because it was a landmark case, it was known for being the crime of the century, the first trial by media and the first to be dominated by forensic science.…
- 339 Words
- 1 Page
Satisfactory Essays -
Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…
- 1195 Words
- 17 Pages
Good Essays -
Cloth frames that matched a pair of Crippen’s pajamas the remains have a rare poison which Crippen was known to have in his possession.…
- 254 Words
- 2 Pages
Satisfactory Essays -
Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since virtually every living organism requires oxygen to survive, it is a necessary component of water systems such as streams, lakes and rivers in order to support aquatic life. The dissolved oxygen is measure in units of ppm—or parts per million. Examine the data in Table 2 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from; finally, answer the questions below.…
- 395 Words
- 2 Pages
Satisfactory Essays -
Using the text for this course, the University Library, the Internet, and/or other resources answer the following questions. Your response to each question should be at least 200 words in length.…
- 813 Words
- 4 Pages
Good Essays -
The patterns of distribution related to rock pocket mice coat color is primarily focused on the genetic variation regarding the fur color of the mice. The population of mice that possess a lighter fur color typically live in regions that contain light coloured rocks within the environment. Still, mice that have a darkened color fur will most often be found in areas in which the environment is surrounded by volcanos with lava flow. The common pattern of the coat color between the rock pocket mice show a correlation with the terrain color, in which there is an adaptive mechanism against predators, which increases the chances of survival.…
- 531 Words
- 3 Pages
Good Essays -
What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?…
- 492 Words
- 2 Pages
Good Essays -
If we are talking about loopback then I would say: this is how the computer would talk to itself. An example would be like sending an email alert but you don’t know which mail service is being used. Talk to the local mail server on TCP/25 and it doesn’t matter because all the mail services listen on TCP/25. Another example is updating. If you don’t have loopback then the files won’t get sent and the update will fail.…
- 340 Words
- 1 Page
Satisfactory Essays -
Retrieve the S&S In-Chapter Database (in Microsoft Access format) from Doc Sharing or the text’s Web site (or create the tables in <link linkend="ch04table05" preference="0">Table 4-5<xref linkend="ch04table05" label="4-5"/></link> in a relational DBMS product). Write queries to answer the following questions. <emphasis>Note</emphasis>: For some questions, you may have to create two queries—one to calculate an invoice total and the second to answer the question asked.…
- 288 Words
- 2 Pages
Satisfactory Essays