You are on page 1of 3

IS4560 Lab2

Implementing Hashing & Encryption for Secure Communications

Steven Schmitt (14586746)


10/17/2014

1. Insert the MD5sum and SHA1sum hash values calculated for example.txt

MD5sum Original File example.txt

565d01aeb8b3c1592a76d17eec836c39

SHA1sum Original File example.txt

5bdc5dad0588e617b8e425f959114016962ee58c

MD5sum Modified File example.txt

C6dbce3552ee0784c5deb773b789705a26240ce0

SHA1 Modified File example.txt

A5e7751c7cce97cafb994eea8dc26e1d2624067

Explain in your own words why the hash values will change when data is modified.
The hash values will change is the text has been modified in any sorts. It the file has not been
modified then the hash value will not change.
2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for
the example.txt sample file? What if it were different when you re-calculated the hash
value at the other end?
The MD5sum and the SHA1sum hash values are the same every time because the example.txt
file does not change because it is a read only file. If the hash file was different after you
recalculated the reason for that would be because the file was modified.
3. If you were using corporate e-mail for internal and external communications but did
not want to encrypt an e-mail message, what other security countermeasure can you
deploy to ensure message integrity?
Another security countermeasure to use if I dud nit want to encrypt email form my corporate
account would be to use a digital signature to ensure message integrity.
4. If you are using corporate e-mail for external communications that contain confidential
information, what other security countermeasure can you deploy to maximize
confidentiality of e-mail transmissions through the Internet?
Utilize a digital signature and use cryptology to maximize confidentiality of email transmissions.
5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is
better and why?
MD5sum is a one-way with a max of 128 bits processed for its input while
SHA1sum can process up to 512 bits along with padding. I think that SHA1sum
is better since padding ensures the right numbers.

6. Where can you store your public keys or public certificate files in the public domain?
Is this the same thing as a Public Key Infrastructure (KI) server?
The public keys or public certificate files can be stored in the Central Repository because this is
a secure location. It is part of the public key infrastructure but it is not the same.
7. What do you need if you want to decrypt encrypted messages and files from a trusted
sender?
You need the senders private key.
8. What encryption mechanisms are built into Microsoft Windows XP Professional?
Encrypting File System (EFS)
9. Which Windows encryption mechanism provides full disk encryption and uses the
Trusted Platform Module to do so? Do you recommend that end-users encrypt their
personal hard drives on Microsoft Windows platform and workstations?
Vista and with Pro and Enterprise editions of Windows 8.
I would say yes.
10. What happens if you have a forensic copy of a hard drive that happens to have the
entire disk encrypted that you try to view with standard forensic tools?
You will be able to view it normally without the encryption.

You might also like