Popular message digest algorithm

Assignment Help Basic Computer Science
Reference no: EM13844149

In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.

In the best use portion, you will discover and outline a specific implementation of the MD5 algorithm, where it provides high value and a very low security risk.

In contrast, in the worst use portion, you will attempt to crack an MD5 hash (this is ethical hacking) and suggest a scenario where the worst use practice may actually be implemented.

The reason for this lab is to give you an understanding of how cryptography can be properly and improperly used and how changes in technology may serve to weaken trusted cryptographic applications.

Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5-10 sentences.

Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.

MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____

MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____

MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____

Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5-10 sentences.

Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.

Reference no: EM13844149

Questions Cloud

Explain what is the profit if the stock price at expiration : What is the profit if the stock price at expiration is $52.50? a. $16 b. $500 c. -$234 d. $250 e. none of the above.What is the net present value of the box spread? a. $9.84 b. $5.00 c. $16.00 d. $1.84 e. none of the above
Write a short paper on the given topic : To write a short paper 4-6 pages on the topic "The impact of banks and non-bank financial institutions on economic growth". In this paper should do a critical evaluation of the attached article
Leading companies using supply chain network redesign : Identify a least one way an organization could benefit from a supply chain network redesign. Discuss at least one example of an area of opportunity for improvement. Describe how a redesign might favor an organization's competitive advantage, from a s..
What is the orbital speed of the satellite : What is the orbital speed of the satellite
Popular message digest algorithm : In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.
Produces two types of photograph-developing fluids : Photo Chemicals produces two types of photograph-developing fluids. Both products cost Photo Chemicals $1 per gallon to produce. Based on an analysis of current inventory levels and outstanding orders for the next month, Photo Chemicals managers have..
What are the motives behind employee behavior : When underhanded behavior or attempts at character assassination are at play, managers may overlook them because the facts may not always be evident. However, doing this can create major issues. What are the motives behind employee behavior in the..
Buying something now and paying for it later : Amount you have to pay before the insurance company pays anything. Buying something now and paying for it later. Research shows you can buy happiness by spending money on people.
Develop facilitate communication-private company network : At Banco do Brasil, a large financial services company in South America with more than 3,000 branch locations, its internal audit department covers a geographically broad area and serves a considerable number of clients. It decided to develop a(n) __..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Common types of policies for web services

What are the most common types of policies for Web services? 12.2 What are the main components of WS-Policy Framework?

  How do you write a program that compares your checking

How do you write a program named Balance.java that compares your checking account balance with your savings account balance (two doubles)

  Charts and conditional formatting

Explain what you believe to be the main business purpose of charts in Excel. Next, discuss whether or not you believe Excel would still be a useful tool if the charting features were removed from the application. Justify your response.

  Computer security is not an issue for organizations alone

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  Create a website that would allow users to enter

Create a Website that would allow users to enter and submit survey (to store in the database) and display survey results of total entered surveyed.

  Company logo executive summary table of content

Group Portion Think of a business you would like to start. (I prefer Business name to be "World pre-owned Producers, Inc." Develop a business plan for your new business. The 4-6 page business plan must include the following: Company Logo Executive Su..

  Create a japplet that contains a jlabel and jbutton.

Create a JApplet that contains a JLabel and JButton. You'll create a JButton that will automatically change font typeface, style, and size when clicked by the user. Change the font typeface, style, and size on the JLabel.

  Leading consultants for a number of patients

Doctors are specialists in some branch of medicine and may be leading consultants for a number of patients, not necessarily from the same ward.

  Green computing involves reducing electricity consumed

Green computing involves reducing electricity consumed

  Partner server to have dfs namespaces with the same name

In Exercise 3.1, explain why it is not a problem for your server and your partner server to have DFS namespaces with the same name (Data).

  Article related to cloud-enabling technology

Find 1 article related to Cloud-Enabling Technology and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article, and (3) a brief statement of your thoughts on the article. These items should be no more than 1 page in l..

  Use the supplied superclass car to create classes

Because Toyotas are superior to Fords or Chevys it should also implement the supplied Airplane interface. Give the methods something to do. I would suggest a println method since you can then see that the method actually ran.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd