Top-Rated Free Essay
Preview

IS4560: Hacking and Countermeasures WEEk1 Lab

Satisfactory Essays
559 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560: Hacking and Countermeasures WEEk1 Lab
Lab 1 Week 1
IS4560: Hacking and Countermeasures

Week 1 Lab: Implement Hashing & Encryption for Secure Communications

Learning Objectives and Outcomes
Upon the completion of this lab, students will be able to perform the following tasks:
Apply common cryptographic and hashing techniques on a message to ensure message confidentiality and integrity
Verify the integrity of the output of common cryptographic and hashing tools to determine whether an encrypted message is legitimate or whether it has been modified
Use and create an MD5 sum or SHA1 hash to generate a unique hash for data to assure the integrity of the data
Relate how a change to the data impacts the hash and why it is important to check the hash provided before executing or unzipping a binary or some other unknown file

Assignment Requirements Watch the Demo Lab in Learning Space Unit 2 and then answer each of the following questions.
Tasks:

1. Use the following encryption algorithms on the following message and record the result: “You Deserve an A”. You may use one of the readily available tools on the Internet to perform this encryption. Please provide the link (URL) of the tool you used.

a. MD5: 02f3b84a0bdae954498783594c668541
b. SHA1: D44A86680D449581A82644C663F8B5C34DB6BBF1
c. Link: http://onlinemd5.com

2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used.

a. MD5: 0cbc6611f5540bd0809a388dc95a615b

Result: Test

b. SHA1: 640AB2BAE07BEDC4C163F679A746F7AB7FB5D1FA

Result: Test

c. Link: http://reverse-hash-lookup.online-domain-tools.com/

3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity? Digital Signature

4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet? A SSL connection, PGP, Email encryption.

5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? MD5: 128-bit/16-byte digest. Somewhat faster than SHA.
SHA: 160-bit/20-byte digest. More secure because stronger against brute force attacks.

6. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server? The storage location is called the certificate store

7. What do you need if you want to decrypt encrypted messages and files from a trusted sender? Private key

8. What encryption mechanisms are built into Microsoft Windows XP Professional?
Encrypting File System

9. Which Windows encryption mechanism provides full disk encryption and uses the Trusted Platform Module to do so? Do you recommend that end-users encrypt their personal hard drives on Microsoft Windows platform and workstations? Bitlocker, I would only recommend so if there are sensitive data kept on the hard. I would also recommend keeping an up to date backup of the drive, because if the mother board were to go bad, you will need to have the data.

10. What happens if you have a forensic copy of a hard drive that happens to have the entire disk encrypted that you try to view with standard forensic tools? It still need to be decrypted

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    12. Relate back to the C-I-A tenets of information systems security. Hashing provides file versioning while encryption provides file…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    PT2520

    • 1263 Words
    • 7 Pages

    Upon completion of the project, you will submit a MS Word document with the answers to the three questions integrated within the project at key points. Questions 1 & 2 are located at the end of Step 11 and Question 3 at the end of Step 12 of the Technical Steps section of this lab. This MS Word document will be named nn_Projectanswers.doc where “nn” will be changed to your initials.…

    • 1263 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1A

    • 432 Words
    • 3 Pages

    INTRODUCTION: In 2 to 3 complete sentences, explain the purpose of this lab – what are you going to learn in this lab? (2 points)…

    • 432 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Please complete this section of your write-up as you work on the experimental portion of this lab.…

    • 1694 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    Question 4: Data integrity is essential for a company 's operations. Describe various steps companies can use to ensure the integrity of its information.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Sivathanu, G., Wright, C. P., & Zadok, E. (2005, November 14). Stony Brook University. Retrieved from Ensuring Data Integrity in Storage: Techniques and Applications: http://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CRYPTOGRAPHY

    • 10720 Words
    • 43 Pages

    Encryption is the process of scrambling data within a communication system to make it unintelligible in such a way that the process can later be reversed by authorised people to reveal the original data by a data decryption process. Often the objective is to protect the confidentiality and integrity of data, because rarely a day goes by that one don’t hear of a data breach. Hospital records stolen, social media accounts hacked, bank details and information hacked and online credit card information stolen. Every industry, company and merchant is susceptible and at risk, that’s why the steady pace of breaches reinforces the need for an advanced encryption standard (AES) as a last line of defence.…

    • 10720 Words
    • 43 Pages
    Powerful Essays
  • Good Essays

    Hill Cipher

    • 806 Words
    • 4 Pages

    When people started doing business online and needed to transfer funds electronically, the applications of cryptography for integrity began to surpass its use for secrecy .The constant increase of information transmitted electronically has lead to an increased reliance on cryptography and authentication. An obvious application of cryptography is the transformation of information to prevent other from observing its meaning. Secure communication is the most straightforward use of cryptography. Two people may communicate securely by encrypting the messages sent between them. The paper presents modifications of the Hill cipher generating dynamic encryption key matrix…

    • 806 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Elliptic Curve Cryptography

    • 6355 Words
    • 26 Pages

    Over the past 30 years, public key cryptography has become a mainstay for secure communications over the Internet and throughout many other forms of communications. It provides the foundation for both key management and digital signatures. In key management, public key cryptography is used to distribute the secret keys used in other cryptographic algorithms (e.g. DES). For digital signatures, public key cryptography is used to authenticate the origin of data and protect the integrity of that data. For the past 20 years, Internet communications have been secured by the first generation of public key cryptographic algorithms developed in the mid-1970 's. Notably, they form the basis for key management and authentication for IP encryption (IKE/IPSEC), web traffic (SSL/TLS) and secure electronic mail.…

    • 6355 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Since World war and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.…

    • 2454 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    Pre Phd Syllabus Hntuk

    • 742 Words
    • 3 Pages

    Key Exchange, Authentication, Formal Analysis of Authentication and key Exchange Protocols, Multiple & Public Key Cryptography, Secret Splitting & Sharing Secure elections, Secure multiparty, Communication, Digital Cash.…

    • 742 Words
    • 3 Pages
    Satisfactory Essays