hashefile.txt I LIKE THE COURSE CMI-422 BECAUSE I LIKE INFORMATION COMPUTER SECURITY Hash (30 points) Consider th file hashefile.txt for the Hash exercise. For this exercise, we suggest to use certutil 1 tool if you are using windows or md5sum and sha1sum, sha256sum in Linux. You can use other tools if you desire. For all your response, you must provide commands used and the output. a. Question 1 - Provide the md5 hash of the file. (3 points) b. Question 2 - Modify the file content and add just one character and provide a new md5 hash of the modified file. - Do the output changed? Why? ( 3 points) c. Question 3 - Provide the SHA1 of the modified file. (3 points) - The hash is the same as which obtained in the previous question (question 2) ? Why? ( 3 points) - What you can conclude about the security of sha1 compared to md5? (3 points) d. Question 4 - With the same modified file, provide sha256 hash. (4 points) - Is the new hash longer or sorter? Why? (4 points) - What you can conclude about the security of sha256 compared to sha1? (2 points) e. Question 5 (5 points) Find 2 protocols where hashing algorithms are used and explain how algorithms are applied to secure the protocol. 2. RSA (35 points) a. Question 1 (10 points) If we choose p as 19 and q as 17 , what would be the n, e and d ? Show all your calculations. b. Question 2 ( 20 points) If we choose RSA to encrypt a message ("CMIS") clearly show how the message will be encrypted by using the public key (n,e) and how the decryption will work by using the private key (n,d). You need to show all the steps for encrypt and decryption. (15 points) You need also to provide the ciphertext obtained. (5 points) Message = CMIS E( Message )= CypherText D( CypherText )= Message c. Question 3 (5 points) Explain clearly and briefly, how RSA can defeat "man in the middle" attack. You can use the following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R