Using Hash Functions to Validate Data Integrity

In this lab, students will use various hashing function such as md5, sha1, and sha512 to verify that files are the same after they are transferred. Hashing algorithms will help determine that the data has integrity and is the same on the source drive as it is on the destination drive.

Overview

Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, md5, sha1, sha256, sha384, and sha512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is the sha512, and the weakest is the md5. Although weaker than the others, the md5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used

OUTCOMES

In this lab, you will learn to: 

  1. Verify integrity in Windows 
  2. Verify integrity on a Linux System after File transfer 
  3. Verify integrity after downloading files from a Web Site 

Key terms and descriptions

MD5 Hash
The Message Digest 5 hashing algorithm, a 128-bit hexadecimal value.
SHA-1 Hash
The Secure Hashing Algorithm which is a 160-bit hexadecimal value.
SHA-256 Hash
A version of the Secure Hashing Algorithm which is a 256-bit hexadecimal value.
SHA-384 Hash
A version of the Secure Hashing Algorithm which is a 384-bit hexadecimal value.
SHA-512 Hash
A version of the Secure Hashing Algorithm which is a 512-bit hexadecimal value.