A hash algorithm will take any size input and generate a certain size hash that is (hopefully) unique to the input. If one character is changed, then the hash will change also. This is used to test the integrity of a file. If you create a hash on a file and someone downloads that file, when they generate a hash, if it is not exactly the same, then something was altered during transit. This could come from a packet drop or if the file was altered by something else, like a man in the middle attack. If the has stays the same, then the file is exactly the same. This can be used on a file system too. You can generate a hash for a file and then if that hash changes at any point, the file has changed it some way. This can be used to detect intrusions to a system.
In this project you will use FileVerifier, a tool that will compute hashes on single or multiple files.
- Read and execute the instructions for Hands-on Project 1 starting on page 371.
- Write a paper describing your experience and project results. Describe challenges you encountered.
Paste the screenshots into your paper. For each screenshot, describe in DETAIL what is taking place.
Save and upload your assignment file here to Canvas.Also, you’ll need my first and last name. Which is Tamanna Tanjum