Assignment 1: Encryption and Hashing Algorithms: Instruments and Instructions
Due Week three and value 100 factors
The CIA and FBI have been working as a joint activity pressure to unearth the that means behind an enormous quantity of intercepted digital communiqué between two recognized operatives believed to be spies. They’ve recruited your organization to help with the decryption of those messages.
Half 1:
Write a paper through which you reply the next:
Earlier than you begin on this mission, each nationwide organizations wish to confirm your means to determine hash and encryptions requirements. Reply the next questions, offering particular particulars for every subject:
Clarify learn how to determine the kind of hash, figuring out a device that may combine with Linux and Home windows so desktop customers are capable of confirm hash values. Specify any on-line instruments.
Describe the distinction between RSA and ECDSA encryption algorithms and title a well known product that makes use of every sort of encryption. Be sure you cite your references.
Use no less than three (three) high quality sources on this assignment. Word: Wikipedia and comparable web sites don’t qualify as high quality sources.
Half 2:
Here’s a helpful on-line useful resource to Help together with your tasked assignment from the FBI. Utilizing the next hyperlink, decrypt the random messages and put them collectively right into a helpful missive. Establish the hash sort and rearrange the messages in logical order to assemble the message.
http://hashtoolkit.com/
Contact your supervisor (professor) to obtain the communiqué, if it’s not shared with you first .
The precise course studying outcomes related to this assignment are:
Describe cryptology and its influence on cybercrime response.
Use know-how and data sources to analysis points in cybercrime methods and response.
Write clearly and concisely about matters associated to cybercrime methods and response utilizing correct writing mechanics and technical model conventions.