tool and commands

   The CIA and FBI possess been established as a articulation toil hardness to unearth the sense after a prodigious totality of intercepted digital communiqué betwixt two unconcealed operatives, believed to be spies. They possess recruited your appoint to further delay the decryption of these notices. Part 1: Write a indecent to five-page (4-5) paper in which you counter-argument the aftercited: Before starting on this mission, twain social organizations shortness to authenticate your power to realize hash and encryptions standards. Counter-argument the aftercited questions, providing specific details for each topic: 1. Explain how to realize the sign of hash, realizeing a hireling that can incorporate delay Linux and Windows so desktop users are effectual to authenticate hash values. Specify any online hirelings. 2. Describe the contrariety betwixt RSA and ECDSA encryption algorithms and call a well-unconcealed consequence that uses each sign of encryption. Be unfailing to name your references. 3. Use at lowest three (3) sort wealths in this assignment. Note: Wikipedia and homogeneous websites do not capacitate as sort wealths. Part 2: Here is a profitable online wealth to aid delay your toiled assignment from the FBI. Using the aftercited couple, decrypt the unpremeditated notices and put them simultaneously into a profitable testament. Realize the hash sign, and rearrange the notices in close appoint to convoke the notice.  http://hashtoolkit.com/ 1. 0f20a1bdfa86796dac3e51a97fd7f592 2. cc639e5261e1970102dd687043bed7eb070a5acdcaddb3ad03294fb040888ecbb890a19133c5b2 4f95693d3d6609d820 3. 8f1bdc9f738064bf28ec72e547c5ab30336e2f8b 4. 9bf243c3ebccb8b66ddcf7626a56e2f5 5. d401196a7c9464e8969bb2d3bddf378a96c18ed0 6. 32ab29740990f632f81f8afd9f77968df7006605bf9b58c4e32c0cf96b958738 7. 7071af964d3f86f3082271f5368248929cfc975d 8. 74f63d8578e364c1cef12be3a6ffc56d