Description
Assignment: Encryption and Hashing Algorithms: Tools and Commands
The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives believed to be spies. They have recruited your company to assist with the decryption of these messages.
Part 1:
Write a paper in which you answer the following:
Before you start on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:
- Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
- Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
- Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Part 2:
Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type and rearrange the messages in logical order to assemble the message.
The specific course learning outcomes associated with this assignment are:
- Describe cryptology and its impact on cybercrime response.
- Use technology and information resources to research issues in cybercrime techniques and response.
- Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running head: CYBERCRIME TECHNIQUE AND RESPONSE
Cybercrime Technique and Response
Name
Institution
Date
1
CYBERCRIME TECHNIQUE AND RESPONSE
Encryption and Hashing Algorithms
Part 1
Hashes are produced by cryptographic algorithms that are created to generate various
characters. Often, the strings possess a predetermined span which is not affected by the input
data. The process of hashing translates data/information on a file to form a code. 2 hash values
(for the original and coped file) undergo comparisons in order to establish the equality or
similarity of the two files. The various hash functions include SHA-1, SHA-256, and MD5. The
creators of software mostly take a downloaded file, such as Windows .exe file or Linux .iso file
and pass it via a hash function. Then, the software creators can provide a formal list containing
all their website's hashes. This way, one is able to acquire the file and run the function for the
purpose of determining its realness, originality, and whether or not it has been manipulated
during the downloading process. Any small alteration on the file remarkably changes the hash
(Ferguson, Schneier & Kohno, 2010).
RSA and ECDSA are 2 of the most-widely digital-signature algorithms utilized by
public-key cryptography systems in providing techniques for authentication. RSA is a widely
known algorithm that offers non-interactive computing for asym...