SlideShare a Scribd company logo
The CIA and FBI have been working as a joint task force to
unearth the meaning behind a vast amount of intercepted digital
communiqué between two known operatives, believed to be
spies. They have recruited your company to assist with the
decryption of these messages.
Part 1:
Write a four to five-page (4-5) paper in which you answer the
following:
Before starting on this mission, both national organizations
want to verify your ability to identify hash and encryptions
standards. Answer the following questions, providing specific
details for each topic:
1. Explain how to identify the type of hash, identifying a tool
that can integrate with Linux and Windows so desktop users are
able to verify hash values. Specify any online tools.
2. Describe the difference between RSA and ECDSA encryption
algorithms and name a well-known product that uses each type
of encryption. Be sure to cite your references.
3. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar websites do not qualify as quality
resources.
Part 2:
Here is a useful online resource to help with your tasked
assignment from the FBI. Using the following link, decrypt the
random messages and put them together into a useful missive.
Identify the hash type, and rearrange the messages in logical
order to assemble the message.
http://hashtoolkit.com/
1. 0f20a1bdfa86796dac3e51a97fd7f592
2.
cc639e5261e1970102dd687043bed7eb070a5acdcaddb3ad03294f
b040888ecbb890a19133c5b2 4f95693d3d6609d820
3. 8f1bdc9f738064bf28ec72e547c5ab30336e2f8b
4. 9bf243c3ebccb8b66ddcf7626a56e2f5
5. d401196a7c9464e8969bb2d3bddf378a96c18ed0
6.
32ab29740990f632f81f8afd9f77968df7006605bf9b58c4e32c0cf9
6b958738
7. 7071af964d3f86f3082271f5368248929cfc975d
8. 74f63d8578e364c1cef12be3a6ffc56d

More Related Content

Similar to The CIA and FBI have been working as a joint task force to unear.docx

78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
P-e-t-a-r
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic WaveKaniska Mandal
 
An Introduction to Semantic Web Technology
An Introduction to Semantic Web TechnologyAn Introduction to Semantic Web Technology
An Introduction to Semantic Web Technology
Ankur Biswas
 
A Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docxA Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docx
sleeperharwell
 
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various ChallengesWeb 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Subhash Basistha
 
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
Finally, in responding to your peers’ posts, assess your peers’ reco.docxFinally, in responding to your peers’ posts, assess your peers’ reco.docx
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
RAJU852744
 
semantic web tech.ppt
semantic web tech.pptsemantic web tech.ppt
semantic web tech.ppt
NaglaaFathy42
 
Assignment RequirementsYou are an experienced digital forensic.docx
Assignment RequirementsYou are an experienced digital forensic.docxAssignment RequirementsYou are an experienced digital forensic.docx
Assignment RequirementsYou are an experienced digital forensic.docx
lynettearnold46882
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   
bellflower9
 
csmalware_malware
csmalware_malwarecsmalware_malware
csmalware_malwareJoshua Saxe
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
Shreyasi Rao
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
Chris Gates
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
jonghollingberry
 
Cis 534 Teaching Effectively--tutorialrank.com
Cis 534  Teaching Effectively--tutorialrank.comCis 534  Teaching Effectively--tutorialrank.com
Cis 534 Teaching Effectively--tutorialrank.com
Soaps82
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
Robinson070
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
GeorgeDixon100
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
sholingarjosh56
 

Similar to The CIA and FBI have been working as a joint task force to unear.docx (20)

78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Riding The Semantic Wave
Riding The Semantic WaveRiding The Semantic Wave
Riding The Semantic Wave
 
An Introduction to Semantic Web Technology
An Introduction to Semantic Web TechnologyAn Introduction to Semantic Web Technology
An Introduction to Semantic Web Technology
 
A Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docxA Penetration Tester evaluates the security of an information infras.docx
A Penetration Tester evaluates the security of an information infras.docx
 
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various ChallengesWeb 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
Web 1.0 to Web 3.0 - Evolution of the Web and its Various Challenges
 
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
Finally, in responding to your peers’ posts, assess your peers’ reco.docxFinally, in responding to your peers’ posts, assess your peers’ reco.docx
Finally, in responding to your peers’ posts, assess your peers’ reco.docx
 
semantic web tech.ppt
semantic web tech.pptsemantic web tech.ppt
semantic web tech.ppt
 
Assignment RequirementsYou are an experienced digital forensic.docx
Assignment RequirementsYou are an experienced digital forensic.docxAssignment RequirementsYou are an experienced digital forensic.docx
Assignment RequirementsYou are an experienced digital forensic.docx
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   
 
csmalware_malware
csmalware_malwarecsmalware_malware
csmalware_malware
 
News2 bytes
News2 bytesNews2 bytes
News2 bytes
 
Open Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon EditionOpen Source Information Gathering Brucon Edition
Open Source Information Gathering Brucon Edition
 
Tics
TicsTics
Tics
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wort.docx
 
Computer 2
Computer 2Computer 2
Computer 2
 
Computer Lesson 1
Computer Lesson 1Computer Lesson 1
Computer Lesson 1
 
Cis 534 Teaching Effectively--tutorialrank.com
Cis 534  Teaching Effectively--tutorialrank.comCis 534  Teaching Effectively--tutorialrank.com
Cis 534 Teaching Effectively--tutorialrank.com
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 

More from karisariddell

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
karisariddell
 
1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx
karisariddell
 
1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx
karisariddell
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx
karisariddell
 
1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx
karisariddell
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx
karisariddell
 
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
karisariddell
 
1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx
karisariddell
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx
karisariddell
 
1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx
karisariddell
 
1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx
karisariddell
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docx
karisariddell
 
1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx
karisariddell
 
1. Which of the following changes will result in a shift of the agg.docx
1.  Which of the following changes will result in a shift of the agg.docx1.  Which of the following changes will result in a shift of the agg.docx
1. Which of the following changes will result in a shift of the agg.docx
karisariddell
 
1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx
karisariddell
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
karisariddell
 
1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx
karisariddell
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
karisariddell
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docx
karisariddell
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx
karisariddell
 

More from karisariddell (20)

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
 
1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx
 
1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx
 
1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx
 
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
 
1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx
 
1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx
 
1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docx
 
1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx
 
1. Which of the following changes will result in a shift of the agg.docx
1.  Which of the following changes will result in a shift of the agg.docx1.  Which of the following changes will result in a shift of the agg.docx
1. Which of the following changes will result in a shift of the agg.docx
 
1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
 
1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docx
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

The CIA and FBI have been working as a joint task force to unear.docx

  • 1. The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages. Part 1: Write a four to five-page (4-5) paper in which you answer the following: Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic: 1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools. 2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references. 3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Part 2: Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive.
  • 2. Identify the hash type, and rearrange the messages in logical order to assemble the message. http://hashtoolkit.com/ 1. 0f20a1bdfa86796dac3e51a97fd7f592 2. cc639e5261e1970102dd687043bed7eb070a5acdcaddb3ad03294f b040888ecbb890a19133c5b2 4f95693d3d6609d820 3. 8f1bdc9f738064bf28ec72e547c5ab30336e2f8b 4. 9bf243c3ebccb8b66ddcf7626a56e2f5 5. d401196a7c9464e8969bb2d3bddf378a96c18ed0 6. 32ab29740990f632f81f8afd9f77968df7006605bf9b58c4e32c0cf9 6b958738 7. 7071af964d3f86f3082271f5368248929cfc975d 8. 74f63d8578e364c1cef12be3a6ffc56d