Preview

Lab #3

Good Essays
Open Document
Open Document
517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #3
Assessment Worksheet

111

LAB #7 – ASSESSMENT WORKSHEET

Relate Windows Encryption and Hashing to Confidentiality and Integrity

Overview
This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.

Lab Assessment Questions & Answers
1. If you and another person want to encrypt messages, should you provide that person with your public

7
Relate Windows Encryption and Hashing to Confidentiality and Integrity

key, private key, or both?
The public key is the only one required in order to conduct encrypted messages.

2. What does GPG allow you to do once it is installed?
GPG is used to encrypt hard drives and their content as a security measure.

3. Name two different types of encryption supported by GPG for your key.
The two types of encryption supported by GPG are MD5 and Sha1 which serve as hashing encryptions.

112

LAB #7 | Relate Windows Encryption and Hashing to Confidentiality and Integrity
4. What happens when you sign and trust a new key to your keychain?

When signing and trusting a new key to the keychain, a new key with with both

private and public access is created.

5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you

import and sign his/her key?

In order to decrypt and encrypt messages, both people have to have eachother's

private keys.

6. What are the similarities between an MD5 hash and a fingerprint?

The similarity is that they both leave a fingerprint leading back to the source data.

7. How would you encrypt a Web server and the pages it serves up?

To encrypt a server, you would need to redirect all the incoming web traffic to
SSL, this would make it so that anything

You May Also Find These Documents Helpful

  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Lab #3

    • 1121 Words
    • 5 Pages

    To begin, the military is a wonderful career to think about. For starters you’re able to serve your country and able to explorer the world with these selected job opportunities, which is great and also exciding. Gabriel Adams explains that “When you join the military you will have access to the highest quality of training and opportunities for a lifetime career in a field you enjoy. You will have base pay, a variety of discounts, support for tuition in your chosen field and full medical insurance coverage.” (Oct 17, 2008). With every single minute in the service you will find that you can take the information you gained and take it further beyond you could imagine.…

    • 1121 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Lab Three

    • 1684 Words
    • 7 Pages

    In this laboratory we utilize simple measures of physical quantities (for example, distance, and mass) and use the measurements to calculate or convert other physical quantities (such volume and area). We also use mathematical calculations and formulas to make conversions from one unit of measurement into another unit of measurement (for example, a conversion from meters to centimeters or Fahrenheit to Celsius)…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 327 Words
    • 2 Pages

    One of the most astounding side-effects of the Internet is how readily accessible information is about individuals, organizations, and computer systems. This assignment is designed to give you some experience in obtaining this information. Materials Needed:  Computer  Internet connection with “Ping” command available Activity…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2147 Words
    • 9 Pages

    Public key cryptography uses a pair of mathematically related cryptographic keys. If one key is used to encrypt information, then only the related key can decrypt that information. Even if one of the keys is known, the other key cannot be easily calculated. Public key system consists of the following:…

    • 2147 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ABC institute will want to email back and forth with XYZ Inc. They can manage this with using asymmetric keys. The sender will simply type the desired message and then use the public key of the person they wish to send the message for encrypting and therefore securing the message to be sent over the very public internet. Having done this the only person who could possibly open and read this email would be the desired recipient. This is insured because since their public key was used to encrypt, the only way to decrypt the message into a readable email is by using the recipient’s private key which only they have access to.…

    • 509 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Public Key Encryption: PKI Public Key Encryption technique to bind information through public key and provide data encryption and encryption. (What is PKI, comodo.com)…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial level encryption uses 128-bit key that is very difficult to crack, even whilst using advanced software. The computer receiving the message understands and recognises the digital key; therefore, it is able to comprehend the intended message.…

    • 607 Words
    • 3 Pages
    Good Essays