Using Hash Functions to Validate Data Integrity
In this lab, students will use various hashing function such as md5, sha1, and sha512 to verify that files are the same after they are transferred. Hashing algorithms will help determine that the data has integrity and is the same on the source drive as it is on the destination drive.
Overview
Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, md5, sha1, sha256, sha384, and sha512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is the sha512, and the weakest is the md5. Although weaker than the others, the md5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used
OUTCOMES
In this lab, you will learn to:
- Verify integrity in Windows
- Verify integrity on a Linux System after File transfer
- Verify integrity after downloading files from a Web Site