Thursday, 18 January 2018

CIS 552 WEEK 3 ASSIGNMENT 1




Assignment 1: Encryption and Hashing Algorithms: Tools and Commands
Due Week 3 and worth 100 points
The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages.
Part 1:
Write a paper in which you answer the following:
Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:





















  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Part 2:
Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type, and rearrange the messages in logical order to assemble the message. 

CIS 552 WEEK 3 ASSIGNMENT 1

Assignment 1: Encryption and Hashing Algorithms: Tools and Commands
Due Week 3 and worth 100 points
The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages.
Part 1:
Write a paper in which you answer the following:
Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:
  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Part 2:
Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type, and rearrange the messages in logical order to assemble the message. 

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...