Describe cryptology and its impact on cybercrime response


Assignment: Encryption and Hashing Algorithms: Tools and Commands

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives believed to be spies. They have recruited your company to assist with the decryption of these messages.

Part 1:

Write a paper in which you answer the following:

Before you start on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.

2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.

3. Use at least three quality resources in this assignment.

Part 2:

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type and rearrange the messages in logical order to assemble the message.

Contact your supervisor (professor) to receive the communiqué, if it is not shared with you first .

The specific course learning outcomes associated with this assignment are:

• Describe cryptology and its impact on cybercrime response.

• Use technology and information resources to research issues in cybercrime techniques and response.

• Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe cryptology and its impact on cybercrime response
Reference No:- TGS02982481

Now Priced at $45 (50% Discount)

Recommended (99%)

Rated (4.3/5)