Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
60 views

EGL202 - Lab - 1 - Compare Data With A Hash (Student)

This document provides instructions for a lab on using a hashing program to verify data integrity. The lab has students create a text file, install and use a hashing program called HashCalc to calculate the MD5 hash of the file, make a minor change to the file, and then calculate a new hash to see that it is different, verifying the data was altered. Hashing programs perform hash functions on data that return a value used to verify if the data has changed or remained the same, with different hash values indicating the data is not identical.

Uploaded by

xian hui
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

EGL202 - Lab - 1 - Compare Data With A Hash (Student)

This document provides instructions for a lab on using a hashing program to verify data integrity. The lab has students create a text file, install and use a hashing program called HashCalc to calculate the MD5 hash of the file, make a minor change to the file, and then calculate a new hash to see that it is different, verifying the data was altered. Hashing programs perform hash functions on data that return a value used to verify if the data has changed or remained the same, with different hash values indicating the data is not identical.

Uploaded by

xian hui
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

EGL202 Cyber Security Essentials

Lab 1 Compare Data with a Hash

A. Objectives
Use a hashing program to verify the integrity of data.

B. Introduction
It is important to understand when data has been corrupted or it has been tampered with. A
hashing program can be used to verify if data has changed, or if it has remained the same. A
hashing program performs a hash function on data or a file, which returns a (usually much shorter)
value.

There are many different hash functions, some very simple and some very complex. When the
same hash is performed on the same data, the value that is returned is always the same. If any
change is performed on the data, the hash value returned will be different.

Note:

You will need installation privileges and some knowledge of the process to install Windows
programs.

Task 1: Create a Text file


1) Search your computer for the Notepad program and open it.

2) Type some text in the program.

Cyber Security Essentials Page 1 Effective date: 05 Mar 2021


3) Choose File > Save.

4) Navigate to Desktop.

5) Type Hash in the File name: field, and click Save.

Task 2: Install HashCalc


1) Open a file explorer and locate the folder location of HashCalc in E Drive in the folder
EG2762.

2) Double click and run the setup.exe file inside.

3) Follow the installation wizard to install HashCalc.

4) Click Finish on the last screen, and close the README file if it opened. You may read
the file if you wish.

Cyber Security Essentials Page 2 Effective date: 05 Mar 2021


5) HashCalc is now installed and running.

Task 3: Calculate a hash of the Hash.txt file


1) Set the following items in HashCalc:

 Data Format: File.


 Data: Click the … button next to the Data field, navigate to the Desktop and
choose the Hash.txt file.
 Uncheck HMAC.
 Uncheck all hash types except MD5.

2) Click the Calculate button.

What is the value next to MD5?

418971d10406b135559a6edc067ca305

Cyber Security Essentials Page 3 Effective date: 05 Mar 2021


Task 4: Make a change to the Hash.txt file
1) Navigate to the Desktop and open the Hash.txt file.

2) Make a minor change to the text, such as deleting a letter, or adding a space or period.

3) Click File > Save, and close Notepad.

Task 5: Calculate a new hash of the Hash.txt file


1) Click the Calculate button in HashCalc again.

What is the value next to MD5?

________________________________________________________________________

Is the value different from the value recorded in Task 3?

yes_____________________________________________________________________
___

2) Place a check mark next to all of the hash types.

3) Click Calculate.

4) Notice that many of the hash types create a hash of a different length. Why?

_many of the hashes use a diff number of bits to produce the


hash____________________________________________________________________
___

Cyber Security Essentials Page 4 Effective date: 05 Mar 2021

You might also like