Hashing algorithm responses

Assignment Help Basic Computer Science
Reference no: EM132367607

Provide (2) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.

DISCUSSION 1:

The MD5 was an algorithm that was used to secure information. Using a 128 bit this was supposed to be a great way to keep a security a main priority until collisions became an issue. Due to the low bit, this created fewer combinations used for signatures. This means it started to create multiples of the same combinations. This made it seem as though valid signatures were produced when really, they were not. SHA-1 is another algorithm that is used to be able to secure information. Unlike the MD5 this algorithm will use a 160-bit hash value. The thought was the larger number of bits the more secure the data would be creating less risk for a breach. This is true as well with the larger amount of bit it has a better statistical value of never repeating itself. That is the main source of protections with using a hash I by making the most possible combinations without the least possibility of a collision. Not wanting a repeat is then end goal. So, my thought is the bigger the better. Before doing more research I already had this opinion in mind as well. It would just make sense that it would be better to have more options to create a better possibility.

DISCUSSION 2:

The difference between SHA-1 and MD5 are so little with the bit increase from 128 to 160, but this makes a drastic difference. Since MD5 has been confirmed that the birthday problem or birthday paradox will work with its hash, the integrity of this function has been lost. While it may take minutes to years for the collision to happen, it's still susceptible for it to occur. Since hash uses mathematics, it makes sense that by increasing the bit would make it more secure. Since SHA-1 is more secure it is slower than MD5, which makes SHA-1 more complex and more secure.

As with all algorithm's, security is what is examined. SHA has progressed further than SHA-1 and if we examine the increases, the bits have also increased. SHA-2 uses 256 bit, which is accepted by different kinds of software. SHA-2 can even go up to 512, but it isn't as readily supported. With the increase in bits, there is a less likely chance of a collision, but it doesn't always mean that it'll be secure.

Reference no: EM132367607

Questions Cloud

Visuals for your presentation : Cis 500-Your project has been staffed-you are about to meet with team for first time.Initial impressions are important and you'll need visuals for presentation.
Morals-values and corporate social responsibility : Pick one of the following terms for your research: Morals, principles, values, corporate social responsibility, or ethical culture
Google information system strategy support business strategy : How does Google's information systems strategy support its business strategy?
About enterprise risk management : The research topic paper should present a general research topic about Enterprise risk management(ERM), narrow the topic down to a specific topics
Hashing algorithm responses : The MD5 was an algorithm that was used to secure information. Using 128 bit this was supposed to be a great way to keep security main priority until collisions
How do team conflicts affect productivity : How do team conflicts affect productivity and how can they be resolved quickly and effectively without harming the performance?
Non verbal communication : Students are to observe two or more adults unknown to observer.Discuss nonverbal communication, i.e. eye contact, body position and any other nonverbal behavior
Emerging technology briefing document : CMGT 557-Emerging Technology Briefing Document. The client has been so busy working and trying to build a customer base,
Team and team performance evaluation : BA 606-- What is meant by the "internal processes" of a team? Why is it important to manage both the internal processes and external opportunities/constraints

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How the project might be reorganized

Assume that a serious, unanticipated setback occurs and instead of taking 10 days, task T5 takes 40 days. Draw up new bar charts showing how the project might be reorganized.

  Implementing enterprise risk management

Implementing Enterprise Risk Management Case Studies and Best Practices. Lessons from the Academy: ERM Implementation in the University Setting

  Prepare and submit a proposal to bill to business plan

prepare and submit a proposal to bill that gives your suggested solution to his business plan. provide bill with the details of what he needs to purchase in order to have what he needs to conduct his business using today's technology

  Search the text data file for the final project

See sample data file below. You are encouraged to add entries and share them with the rest of the class. Implement a program to read and search the text data file. The project will be graded according the criteria for the final project - see below..

  Should you delay the start of the project to replan the work

What can you, the project manager, do about this? Should you delay the start of the project to replan the work?

  Finding different sizes of newspaper for local newspaper

Comprise a specific recommendation regarding how many different sizes newspaper must offer.

  Bugs in the code for the game

However, there are bugs in the code for the game! Read through the code and fix all of the bugs so that the game can work properly.

  Identify and confirm proper implementation of such analytics

How does one evaluate the types of tracking beacon variables passed to the analytics platform collection servers? How do tracking beacon audits help ensure reliable data collection?

  Build a graphical representation of a web-based input

build a graphical representation of a Web-based input for making a hotel reservation

  City jail information director

The following memo was used to create an initial database design (E-R model) for the City Jail that indicates entities, attributes (columns), primary keys.

  Find another sequence of queries

Find another sequence of queries such that the greedy algorithm can assign as few as half the queries that the optimum off-line algorithm assigns on that sequence.

  What is the reponse time when the load is low

What is the reponse time when the load is low?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd