Top-Rated Free Essay
Preview

Lab #2 – Assessment Worksheet

Good Essays
392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #2 – Assessment Worksheet
Lab #2 – Assessment Worksheet
Applying Encryption and Hashing Algorithms for Secure Communications

Overview
In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.
Lab Assessment Questions & Answers
1. Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The hash values will change when the data is modifie
2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the example.txt file? What if it were different when you recalculated the hash value at the other end? The MD5sum and SHA1 sum hash values the same every time is because it is from the same content of the file being used by original user.
3. If you want secure e-mail communications without encrypting an e-mail message, what other security countermeasure can you deploy to ensure message integrity? You can deploy to ensure message integrity is by using digital signatures, whether it is encrypted or not,
4. What is the –e switch used for with running the GnuPG command?
B. Encrypt
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. So SHA is more secure.
6. Name the cryptographic algorithms used in this lab. MD5sum and SHA1sum.
7. What do you need if you want to decrypt encrypted messages and files from a trusted sender? Use GPG to encrypt, decrypt, sign and verify files or emails.
8. What is the -d switch used for when running the GnuPG command? C. Decrypt
9. When creating a GnuPG private key, what are ways to create entropy? find * / && find * / && find * / && find * / && find * / && find * /
Part 2~ 6 Lab screen shot

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Answers

    • 508 Words
    • 3 Pages

    Note: the analysis #1 a) and b) will only be demonstrated on the graphs of trial 1 for this report, trial 2-5 have approximately the same results.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Paul Fitts’ was the first to discover the relationship between the speed of movement and accuracy requirements. This has become one of the most fundamental principles of motor control. Fitts claims a relationship between task difficulty and movement time. He quantified task difficulty as “index of difficulty” which consists of the ratio of twice the amplitude over width of the target (2Amplitude/Width). This relationship states that when movement amplitude decreases or when target width increases movement time is shorter (Fitts, 1954). Fitts found that the relationship between amplitude and width was given by the equation: MT= a + b[log2(2A/W)]. The empirical constants a and b represent the y-intercept and the slope (Schmidt & Lee, 2011).…

    • 1425 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Lab And Assignment

    • 311 Words
    • 2 Pages

    Complementary Metal Oxide Semiconductor, or CMOS, is a widely used type of semiconductor. CMOS semiconductors use both NMOS(negative polarity) and PMOS(positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This feature makes them convenient for use in battery-powered devices such as laptops. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and the system setup parameters. To access the CMOS on most computers, press the delete key as the computer is booting.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz010: Lab Report

    • 929 Words
    • 4 Pages

    | LabRepQuiz010 Question MC #7: Which of the following is the best written sentence that includes the information below taken from an article written by Dr. Costanza, but avoids plagiarism?…

    • 929 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lab 1.7 rubric

    • 349 Words
    • 2 Pages

    b) Should be in the past tense and passive voice. Remember, you did this investigation earlier in the week. Example: “The instantaneous velocity was calculated by dividing .04 m by the time of the main gate.”, and NOT “I calculate the velocity”.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Module two lab questions

    • 254 Words
    • 2 Pages

    Cloth frames that matched a pair of Crippen’s pajamas the remains have a rare poison which Crippen was known to have in his possession.…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 1 assignment

    • 395 Words
    • 2 Pages

    Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since virtually every living organism requires oxygen to survive, it is a necessary component of water systems such as streams, lakes and rivers in order to support aquatic life. The dissolved oxygen is measure in units of ppm—or parts per million. Examine the data in Table 2 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from; finally, answer the questions below.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Using the text for this course, the University Library, the Internet, and/or other resources answer the following questions. Your response to each question should be at least 200 words in length.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?…

    • 492 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    If we are talking about loopback then I would say: this is how the computer would talk to itself. An example would be like sending an email alert but you don’t know which mail service is being used. Talk to the local mail server on TCP/25 and it doesn’t matter because all the mail services listen on TCP/25. Another example is updating. If you don’t have loopback then the files won’t get sent and the update will fail.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lab exam 2

    • 275 Words
    • 2 Pages

    William Jennings Bryan argues against the gold standard. What arguments does he give against the gold standard and why does it oppress the common people?…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Accounting

    • 288 Words
    • 2 Pages

    Retrieve the S&S In-Chapter Database (in Microsoft Access format) from Doc Sharing or the text’s Web site (or create the tables in <link linkend="ch04table05" preference="0">Table 4-5<xref linkend="ch04table05" label="4-5"/></link> in a relational DBMS product). Write queries to answer the following questions. <emphasis>Note</emphasis>: For some questions, you may have to create two queries—one to calculate an invoice total and the second to answer the question asked.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays