Popular message digest algorithm

Assignment Help Basic Computer Science
Reference no: EM13844149

In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.

In the best use portion, you will discover and outline a specific implementation of the MD5 algorithm, where it provides high value and a very low security risk.

In contrast, in the worst use portion, you will attempt to crack an MD5 hash (this is ethical hacking) and suggest a scenario where the worst use practice may actually be implemented.

The reason for this lab is to give you an understanding of how cryptography can be properly and improperly used and how changes in technology may serve to weaken trusted cryptographic applications.

Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5-10 sentences.

Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.

MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____

MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____

MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____

Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5-10 sentences.

Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.

Reference no: EM13844149

Questions Cloud

Explain what is the profit if the stock price at expiration : What is the profit if the stock price at expiration is $52.50? a. $16 b. $500 c. -$234 d. $250 e. none of the above.What is the net present value of the box spread? a. $9.84 b. $5.00 c. $16.00 d. $1.84 e. none of the above
Write a short paper on the given topic : To write a short paper 4-6 pages on the topic "The impact of banks and non-bank financial institutions on economic growth". In this paper should do a critical evaluation of the attached article
Leading companies using supply chain network redesign : Identify a least one way an organization could benefit from a supply chain network redesign. Discuss at least one example of an area of opportunity for improvement. Describe how a redesign might favor an organization's competitive advantage, from a s..
What is the orbital speed of the satellite : What is the orbital speed of the satellite
Popular message digest algorithm : In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.
Produces two types of photograph-developing fluids : Photo Chemicals produces two types of photograph-developing fluids. Both products cost Photo Chemicals $1 per gallon to produce. Based on an analysis of current inventory levels and outstanding orders for the next month, Photo Chemicals managers have..
What are the motives behind employee behavior : When underhanded behavior or attempts at character assassination are at play, managers may overlook them because the facts may not always be evident. However, doing this can create major issues. What are the motives behind employee behavior in the..
Buying something now and paying for it later : Amount you have to pay before the insurance company pays anything. Buying something now and paying for it later. Research shows you can buy happiness by spending money on people.
Develop facilitate communication-private company network : At Banco do Brasil, a large financial services company in South America with more than 3,000 branch locations, its internal audit department covers a geographically broad area and serves a considerable number of clients. It decided to develop a(n) __..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd