Popular message digest algorithm

Assignment Help Basic Computer Science
Reference no: EM13844149

In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.

In the best use portion, you will discover and outline a specific implementation of the MD5 algorithm, where it provides high value and a very low security risk.

In contrast, in the worst use portion, you will attempt to crack an MD5 hash (this is ethical hacking) and suggest a scenario where the worst use practice may actually be implemented.

The reason for this lab is to give you an understanding of how cryptography can be properly and improperly used and how changes in technology may serve to weaken trusted cryptographic applications.

Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5-10 sentences.

Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.

MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____

MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____

MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____

Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5-10 sentences.

Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.

Reference no: EM13844149

Questions Cloud

Explain what is the profit if the stock price at expiration : What is the profit if the stock price at expiration is $52.50? a. $16 b. $500 c. -$234 d. $250 e. none of the above.What is the net present value of the box spread? a. $9.84 b. $5.00 c. $16.00 d. $1.84 e. none of the above
Write a short paper on the given topic : To write a short paper 4-6 pages on the topic "The impact of banks and non-bank financial institutions on economic growth". In this paper should do a critical evaluation of the attached article
Leading companies using supply chain network redesign : Identify a least one way an organization could benefit from a supply chain network redesign. Discuss at least one example of an area of opportunity for improvement. Describe how a redesign might favor an organization's competitive advantage, from a s..
What is the orbital speed of the satellite : What is the orbital speed of the satellite
Popular message digest algorithm : In this lab, you will explore the best and worst use of a popular message digest algorithm. For this one, we shall focus on MD5, but all of this can be applied to the other ones, such as SHA-1.
Produces two types of photograph-developing fluids : Photo Chemicals produces two types of photograph-developing fluids. Both products cost Photo Chemicals $1 per gallon to produce. Based on an analysis of current inventory levels and outstanding orders for the next month, Photo Chemicals managers have..
What are the motives behind employee behavior : When underhanded behavior or attempts at character assassination are at play, managers may overlook them because the facts may not always be evident. However, doing this can create major issues. What are the motives behind employee behavior in the..
Buying something now and paying for it later : Amount you have to pay before the insurance company pays anything. Buying something now and paying for it later. Research shows you can buy happiness by spending money on people.
Develop facilitate communication-private company network : At Banco do Brasil, a large financial services company in South America with more than 3,000 branch locations, its internal audit department covers a geographically broad area and serves a considerable number of clients. It decided to develop a(n) __..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why would you use the const keyword

What is the const keyword in C++? Why would you use the const keyword?

  The task is to animate a cat chasing a mouse

The task is to animate a cat chasing a mouse as it tries to get close enough to catch it (within 1 foot). Of course, as the cat continues to chase the mouse, the mouse is also running away and moves to random positions, trying to lose the cat. You wa..

  Data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs, Flash RAM, and solid-state drives

  Find the values of a and b such that error is minimized

Find the values of A and B such that error is minimized. What power of h is the error proportional to?

  Detailed description of the area researched

Select a current trend in the area of telecommunications. Prepare a 10-15 page paper in Microsoft Word (counts as 10% of the final grade) AMU approved APA format (see writing expectations in the Policies section) (350 words per page). At a minimum in..

  Concept of protecting personal information & ethical issues

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly..

  Estimate for risk management in accompanying data

Estimate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first? Which one should be evaluated last?

  Artificial intelligence systems form a broad

Artificial intelligence systems form a broad and diverse set of systems that can replicate human decision making for certain types of well-defined problems.

  Given an array of n real-valued random elements

Consider the problem of selection: Given an array of n real-valued random elements and an integer k, we want to find the k th smallest element. What is the worst-case and average-case time complexity for each of the following algorithms? Provide a br..

  Analysis of competitive organization and possible threats

Analysis of competitive organization and possible threats and how organization is using E-Business Management facilities for daily activities? Limitations if any, adding more features for E-Business if required.

  Explain use of compensatory substituent in identification

Explain the use of "compensatory substituent" in identification and annotation of non-coding genes? Write down the difference between matrix and a Blosum60 Blosum20 matrix?

  Distributed denial of service attack

Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd