Lab Assignment 2
Lab Assignment 2
Exercise 1
Follow the steps and display the screenshots with short descriptions.
The text message throughout this lab shall comprise the following text:
4. Encrypt the text message with DES and decrypt it with triple DES, and
opposite, encrypt the text message with triple DES and decrypt it with
DES.
5. Encrypt and decrypt the text message with the Caesar algorithm
Page 1 of 4
Exercise 2
Objectives
Use a hashing program to verify the integrity of data.
Background / Scenario
It is important to understand when data has been corrupted or it has been
tampered with. A hashing program can be used to verify if data has
changed, or if it has remained the same. A hashing program performs a
hash function on data or a file, which returns a (usually much shorter) value.
There are many different hash functions, some very simple and some very
complex. When the same hash is performed on the same data, the value
that is returned is always the same. If any change is performed on the data,
the hash value returned will be different.
Page 3 of 4
Step 3: Calculate a hash of the Hash.txt file
a. Set the following items in HashCalc:
1) Data Format: File.
2) Data: Click the … button next to the Data field, navigate to the Desktop and choose the Hash.txt
file.
3) Uncheck HMAC.
4) Uncheck all hash types except MD5.
b. Click the Calculate
button. What is the
value next to MD5?
Page 4 of 4