Implement Hashing and Encryption for Secure Communications
Dr. Jodine Burchell
CIS 552 Cybercrime Techniques and Responses
October 18, 2013
The MD5sum hash string for Example.txt
The SHA1sum hash string for Example.txt
The MD5sum hash string for modified Example.txt
SHA1sum hash string for modified Example.txt
Briefly expalin why this change occurred and how it could be useful to a security analyst verifying the file.
The reason why the ...view middle of the document...
txt file? What if they were different when you recalculated the hash value at the other end?
The reason why the MD5sum and SHA1 sum hash values the same every time is because it is from the same content of the file being offered by the original author. If they were different, then that suggests that the content was from another author.
3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security measure can you deploy to ensure message integrity?
Another security measure you can deploy to ensure message integrity is by using digital signatures. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact.
4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through Internet?
Another security countermeasure you can deploy to maximize confidentiality of e-mail transmissions through Internet is the Point-to-Point Tunneling Protocol (PPTP). PPTP allows corporations to extend their own corporate network through private "tunnels" over the public Internet. PPTP maintains the virtual connection and the encryption that ensures confidentiality.
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?
The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. More secure because stronger against brute force attacks.
6. When can you store your public keys or public certificate files in the public domain? Is this the same thing as a public key infrastructure (PKI) server?
You can store your public keys or public certificate files in the public domain locally on the computer or device that requested it or, in the case of a user, on the computer or device that the user used to request it. Yes the PKI is the same thing as the public keys because the public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message.
7. What do you...