ENCRYPTION AND HASHING ALGORITHMS: TOOLS AND COMMANDS

User Generated

trrmltfq

Computer Science

Description

Encryption and Hashing Algorithms: Tools and Commands

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages.

Part 1:

Write a paper in which you answer the following:

Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (3) quality resources in this assignment.

Part 2:

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type, and rearrange the messages in logical order to assemble the message.

http://hashtoolkit.com/

  1. 0f20a1bdfa86796dac3e51a97fd7f592
  2. cc639e5261e1970102dd687043bed7eb070a5acdcaddb3ad03294fb040888ecbb890a19133c5b2 4f95693d3d6609d820
  3. 8f1bdc9f738064bf28ec72e547c5ab30336e2f8b
  4. 9bf243c3ebccb8b66ddcf7626a56e2f5
  5. d401196a7c9464e8969bb2d3bddf378a96c18ed0
  6. 32ab29740990f632f81f8afd9f77968df7006605bf9b58c4e32c0cf96b958738
  7. 7071af964d3f86f3082271f5368248929cfc975d
  8. 74f63d8578e364c1cef12be3a6ffc56d
  • Describe cryptology and its impact on cybercrime response.
  • Use technology and information resources to research issues in cybercrime techniques and response.
  • Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: ENCRYPTION AND HASHING ALGORITHMS

Encryption and Hashing Algorithms: Tools and Commands
Names:
Institution:

1

ENCRYPTION AND HASHING ALGORITHMS
Encryption and hashing algorithms: tools and commands
Part 1: Encryption and Hashing Algorithms
Hashing and identification of hash values
Technology has advanced significantly. Presently, there are various security measures
that can be put in place so that one can limit access to their messages. One of this is hashing,
which is a cryptographic security measure that condenses an input message into a fixed-size
value. This value is often referred to as the hash. However, while hashing is commonly
mistaken for encryption, it differs significantly from encryption in that encryption often
applies a two-step process involving encryption and decryption of the message – and that
makes encryption reversible – while hashing uses a one-way process of hashing that results in
an irreversible value that is of fixed length (Nasr, Hirschberg & Baldi, 2010). For agencies
such as the CIA and FBI, intercepting encrypted messages could be challenging based on the
type of encryption or the hashing method that has been used. In fact, the agencies have
already jointly requested for assistance in encrypted messages that they intercepted from a
known operative. In this regard, this paper will explain a way that one can identify the type of
hash, tools that the agency could integrate with Linux and Windows desktop environments to
verify the hash values and explain the difference between RSA and ECDSA encryption
algorithms. In the end, this paper will also help in deciphering the codes hash values that the
agencies have presented.
There are various has algorithms within the industry. Some of the most common
hashes include MD5, SHA1, and SHA256. However, as has been described earlier on, hashes
often result in fixed-size values regardless of the input message. However, it should be noted
that a slight change in the input could vary the hash value considerably despite the two
resultant values being of fixed size. As such, the length of the hash value can easily guide an

2

ENCRYPTION AND HASHING ALGORITHMS
individual on the type of hash that has been applied. For instance, MD...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags