Preview

Lab #3

Good Essays
Open Document
Open Document
517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #3
Assessment Worksheet

111

LAB #7 – ASSESSMENT WORKSHEET

Relate Windows Encryption and Hashing to Confidentiality and Integrity

Overview
This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.

Lab Assessment Questions & Answers
1. If you and another person want to encrypt messages, should you provide that person with your public

7
Relate Windows Encryption and Hashing to Confidentiality and Integrity

key, private key, or both?
The public key is the only one required in order to conduct encrypted messages.

2. What does GPG allow you to do once it is installed?
GPG is used to encrypt hard drives and their content as a security measure.

3. Name two different types of encryption supported by GPG for your key.
The two types of encryption supported by GPG are MD5 and Sha1 which serve as hashing encryptions.

112

LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity
4. What happens when you sign and trust a new key to your keychain?

When signing and trusting a new key to the keychain, a new key with with both

private and public access is created.

5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you

import and sign his/her key?

In order to decrypt and encrypt messages, both people have to have eachother's

private keys.

6. What are the similarities between an MD5 hash and a fingerprint?

The similarity is that they both leave a fingerprint leading back to the source data.

7. How would you encrypt a Web server and the pages it serves up?

To encrypt a server, you would need to redirect all the incoming web traffic to
SSL, this would make it so that anything

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Relate how a change to the data impacts the hash and why it is important to check the hash provided before executing or unzipping a binary or some other unknown file…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The best type of key to use in this situation would be public-key cryptography, also known as asymmetric cryptography. It is a type of cryptographic algorithm that requires two separate keys. One of those keys is private, and kept secret. The other is public and distributed to those who need it. The keys are both needed since they are part of a mathematical algorithm, and one will not work without the other. This can be important in two ways. First it can be used to encrypt plain text information like files and emails. Second, it can be used to verify the identity of the person you are communicating with.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Network Associates, Inc. (1990-1999). Introduction to Cryptography. Retrieved from The International PGP Home Page: ftp://ftp.pgpi.org/pub/pgp/6.5/docs/english/IntroToCrypto.pdf…

    • 1325 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Encryption entails rearranging data in such a way that only the owner of both the encryption and decryption key can understand. It serves the purpose of passing information over networks in a “secret” form so that it cannot be interrupted by hackers who may wish to view the communications for malicious reasons. Encryption is extremely important for e-commerce as it allows confidential information such as credit and debit card details to be sent safely to the online business which is receiving these details. Web browsers are able to encrypt purchase details using an encryption method known as SSL (Secure Socket Layer). SSL is switched on when a user visits a secure server site which begins with HTTPS (Secure HyperText Protocol).…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * It can be seen clearly that the Internet has developed with a very high speed in many recent years. In the 80s of last century, the Internet was only used in US army, but nowadays, the Internet has come to every country, every home and everyone. However, such fast develops also go along with the increasing number of security issues from the Internet. Therefore there is a need to find a security solution for this issue and that is the season why Internet Protocol Securities exists.…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Data Encryption

    • 757 Words
    • 4 Pages

    Bibliography: 1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks.com 2. Biasci, L. (1999). Cryptology. www.whatis.com. 3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.com. 4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.com. 5. SSH Communications Security, (1999). Cryptographic Algorithms. www.ipsec.com. 6. SSH Communications Security, (1999). Introduction to Cryptography. www.ipsec.com.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Better Essays

    private key and a public key. The public key is published in a place where anyone has access to it. However, each individual person or computer also chooses a private key that should…

    • 3024 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Data that can be read and understood without any special measures is called plaintext or cleartext. Here Plain image is converted as Plaintext.The method of disguising plain image in such a way as to hide its substance is called encryption. Encrypting plain image results in unreadable gibberish called cipher image. You use encryption to ensure that information is hidden from anyone for whom it is not cipher image to its original plain image is called decryption. Figure 1.1 illustrates this.…

    • 12298 Words
    • 49 Pages
    Powerful Essays
  • Powerful Essays

    Networking

    • 1382 Words
    • 5 Pages

    Symmetric Key Cryptography uses the same cryptographic keys to encipher and decipher the message using symmetric encryption. The sender and receiver share the same key. Symmetric encryption method use mathematical operations that can be programmed into extremely fast computing algorithms which makes encryption and decryption of the messages quick even with the small computers. With the Symmetric encryption the secret key should be send through different channel or band to…

    • 1382 Words
    • 5 Pages
    Powerful Essays