information security

information security

  • Submitted By: kaespoto
  • Date Submitted: 10/30/2014 2:41 AM
  • Category: Technology
  • Words: 611
  • Page: 3
  • Views: 1

Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. Hash values change when data is modified, so integrity and authentication can be established after the transfer. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the example.txt sample file What if they were different when you re-calculated the hash value at the other end This would mean that the data was modified during the transfer, so it was does not have integrity or confidentiality. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity Another alternative for securing e-mails would be to apply digital signatures. This is a good practice, but it is important to establish a layered security approach and apply encryptions too. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet With this situation you can apply digital signatures and encryptions. This would help protect the confidentiality of e-mail transmissions significantly. What is the difference between MD5sum and SHA1sum hashing calculations Which is better and why The major difference between MD5 and SHA1 is that MD5 uses 128bit and SHA1 160bit for the hash length which is stronger but slower. SHA1 is the better choice because the hash value is longer. This makes it harder to crack because it contains more possibilities. Where can you store your public keys or public certificate files in the public domain Is this the same thing as a public key infrastructure (PKI) server Certificate stores. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender The...

Similar Essays