This website uses cookies to ensure you have the best experience. Learn more

Implement Hashing And Encryption For Secure Communications

1164 words - 5 pages

Implement Hashing and Encryption for Secure Communications

NaTasha Scott

Dr. Jodine Burchell

CIS 552 Cybercrime Techniques and Responses

October 18, 2013

The MD5sum hash string for Example.txt

The SHA1sum hash string for Example.txt

The MD5sum hash string for modified Example.txt

SHA1sum hash string for modified Example.txt

Briefly expalin why this change occurred and how it could be useful to a security analyst verifying the file.
The reason why the ...view middle of the document...

txt file? What if they were different when you recalculated the hash value at the other end?
The reason why the MD5sum and SHA1 sum hash values the same every time is because it is from the same content of the file being offered by the original author. If they were different, then that suggests that the content was from another author.
3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security measure can you deploy to ensure message integrity?
Another security measure you can deploy to ensure message integrity is by using digital signatures. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact.
4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through Internet?
Another security countermeasure you can deploy to maximize confidentiality of e-mail transmissions through Internet is the Point-to-Point Tunneling Protocol (PPTP). PPTP allows corporations to extend their own corporate network through private "tunnels" over the public Internet. PPTP maintains the virtual connection and the encryption that ensures confidentiality.
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. More secure because stronger against brute force attacks.
6. When can you store your public keys or public certificate files in the public domain? Is this the same thing as a public key infrastructure (PKI) server?
You can store your public keys or public certificate files in the public domain locally on the computer or device that requested it or, in the case of a user, on the computer or device that the user used to request it. Yes the PKI is the same thing as the public keys because the public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message.
7. What do you...

Other Papers Like Implement Hashing and Encryption for Secure Communications

Select Appropriate Algorithms Essay

401 words - 2 pages company's needs and justify the recommendation. 4. Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. Select an encryption solution that best meets the company's needs

Encryption a Means of Security Essay

4201 words - 17 pages first encryption method, called hashing, creates a unique, fixed-length signature for a message or data set. Hashes are created with an algorithm, or hash function, and people commonly use them to compare sets of data. Since a hash is unique to a specific message, even minor changes to that message result in a dramatically different hash, thereby alerting a user to potential tampering. A key difference between hashing and the other two encryption


851 words - 4 pages In 1997 Yuliang Zheng presented a positive answer to the following question: “is it possible to transfer a message of arbitrary length in a secure and authenticated way with an expense less than that required by signature then encryption?”. This was for the first time, since public-key cryptography has been invented, that the question is addressed in literature. He discovered a new cryptographic primitive, called signcryption, which

Security Pllus Exam Essentials

5089 words - 21 pages services. Be able to discuss the weaknesses and vulnerabilities of the various applications that run on a network. Web, e-mail, and other services each present unique security challenges that must be considered. Turn off services that aren’t needed. Make sure applications are kept up to date with security and bug fixes. Implement these services in a secure manner, as the manufacturer intended; this is the best method for securing applications

Virtual Private Network

2502 words - 11 pages the software needed to reach the NAS from their desktop computer or laptop. For a VPDN, the secure and encrypted connection between the company's network and remote users is provided by the third-party service provider. Network Access Server Abbreviated as NAS, a network access server is an access gateway between an external communications network and an internal network. A common use of NAS is by Internet service providers (ISP) where the

chasing girl

877 words - 4 pages secret way firewall to the Internet , such as black lists. Although the firewall can hit for power to the external network to implement effective protection, but the security of information transmission within the network but could do nothing to achieve the security of e-commerce also need some protection for dynamic security technology. Data encryption Symmetric encryption: symmetric encryption, also known as the private key encryption. The

Asia Pacific

586 words - 3 pages communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. There are slight differences between SSL and TLS, but they are substantially the same. ------------------------------------------------- Data representation The purpose of a network is to transmit information from one computer to another. To do this, you first have to decide how to encode the data to be sent, in other

Public-Key Encryption

3491 words - 14 pages in the issuing of secure keys and is referred to as the key distribution problem, which we will discuss later in the key management section. Figure 2. Two-party communication using encryption, with a secure channel for key exchange. The decryption key d can be efficiently computed from the encryption key e. (Menezes et al., 1997, figure 1.7) A Brief Explanation of Modular Arithmetic Public-key use a mathematical technique called integer

Logical vs Physical Topology

2773 words - 12 pages i.e. Internet which is un-trusted. So confidentiality is required during transmission and it must be kept secure against all type of threats The related concepts and business practices not only influence communications, the routines of daily life and personal relationships, they represent opportunities for initiating new international and domestic business ventures. However, as the Cyber is used increasingly as a platform for e-commerce

New IT Technologies

1673 words - 7 pages where homomorphic encryption comes into play and our next emerging technology. Homomorphic encryption Homomorphic encryption is a method whereby encrypted files could be categorized, and mined, while remaining in an encrypted state. The concept has been around for years, but real strides have been made over the last few years, which may soon make homomorphic encryption a reality. According the E. Messer (2013)”, IBM said it's received a

New It Technologies

1662 words - 7 pages different from one another as the opportunities are for enterprises to use them. The next phase is putting the cloud to work and designing an overarching approach that weaves cloud capabilities into the fabric of IT solutions and responses—with business value the uppermost priority. Possibly even more pressing an issue than standards in this new cloud frontier is the emerging question of jurisdiction. Data that might be secure in one country may not

Related Essays

Develop And Implement Reactive Monitoring Systems For Health And Safety

1866 words - 8 pages STATEMENT Evidence no. Unit 6 | Evidence title Develop and implement reactive monitoring systems for health and safety | Unit / LO.AC | Statement | Evidencereference | | I am a current serving Prison Officer with the Scottish Prison Service with over 23 years

Unit 401. Develop And Implement Effective Communication Systems For Health And Safety Information

2384 words - 10 pages UNIT TITLE: DEVELOP AND IMPLEMENT EFFECTIVE COMMUNICATION SYSTEMS FOR HEALTH AND SAFETY INFORMATIONUNIT NO: 401 | Unit Aims * Evaluating Health and Safety information external to their organisation * Communicating relevant Health and Safety information through an effective system within the organisation * Making sure that relevant Health and Safety information from their organisation is communicated to statutory and local

What Will Be A "Game Changer" For Europe And Poland: Secure Supplies, Shale Gas, Open Market Or Renewable Energy

1039 words - 5 pages WHAT WILL BE A "GAME CHANGER" FOR EUROPE AND POLAND: SECURE SUPPLIES, SHALE GAS, OPEN MARKET OR RENEWABLE ENERGY (a "game changer" means- which of the mentioned options will influence strongly/determine energy developments in Europe and Poland) Zarówno w Polsce, jak i w Europie można zaobserwować wielkie zmiany zachodzące w sektorze energetyki. W ostatnich latach zintensyfikowano poszukiwania złóż gazu łupkowego, Polska przygotowuje się do

Metabical: Positioning And Communications Strategy For A New Weight Loss Drug

4985 words - 20 pages 4240 JULY 22, 2010 JOHN A. QUELCH HEATHER BECKHAM Metabical: Positioning and Communications Strategy for a New Weight-Loss Drug “I have tried countless diets and every new weight-loss pill that has come on the market. Nothing seems to take off those extra pounds. With diets, I am miserable because I am starving all the time, and none of the weight-loss pills seem to work. I might lose a couple pounds, but I never reach my weightloss goals