Complete the Applying Encryption and Hashing Algorithms for Secure Communications lab. As you go through the lab, be sure to:

Perform all screen captures as the lab instructs and paste them into a Word document. (All labs are completed, please see the attachment)

In the same Word document:

Explain the concepts and procedures involved in applying encryption and hashing algorithms by addressing the following:

Explain why hash values are an important part of performing a forensic investigation.

Explain why (or why not) hash values typically change if data is modified.

Identify a method of securing message integrity during e-mail communications without encrypting the e-mail.

Explain the purpose of the –e switch in the GnuPG command.

Compare and contrast MD5sum and SHA1sum hashing algorithms.

In what ways are they similar (compare)?

In what ways do they differ (contrast)?

Identify the cryptographic algorithms used during the lab.

Explain what is required to decrypt an encrypted message.


    Customer Area

    Make your order right away

    Confidentiality and privacy guaranteed

    satisfaction guaranteed