Hashing algorithm responses

Assignment Help Basic Computer Science
Reference no: EM132367607

Provide (2) 150 words response with a minimum of 2 APA references at the discussions below. Response provided should further discuss the subject or provide more insight.

DISCUSSION 1:

The MD5 was an algorithm that was used to secure information. Using a 128 bit this was supposed to be a great way to keep a security a main priority until collisions became an issue. Due to the low bit, this created fewer combinations used for signatures. This means it started to create multiples of the same combinations. This made it seem as though valid signatures were produced when really, they were not. SHA-1 is another algorithm that is used to be able to secure information. Unlike the MD5 this algorithm will use a 160-bit hash value. The thought was the larger number of bits the more secure the data would be creating less risk for a breach. This is true as well with the larger amount of bit it has a better statistical value of never repeating itself. That is the main source of protections with using a hash I by making the most possible combinations without the least possibility of a collision. Not wanting a repeat is then end goal. So, my thought is the bigger the better. Before doing more research I already had this opinion in mind as well. It would just make sense that it would be better to have more options to create a better possibility.

DISCUSSION 2:

The difference between SHA-1 and MD5 are so little with the bit increase from 128 to 160, but this makes a drastic difference. Since MD5 has been confirmed that the birthday problem or birthday paradox will work with its hash, the integrity of this function has been lost. While it may take minutes to years for the collision to happen, it's still susceptible for it to occur. Since hash uses mathematics, it makes sense that by increasing the bit would make it more secure. Since SHA-1 is more secure it is slower than MD5, which makes SHA-1 more complex and more secure.

As with all algorithm's, security is what is examined. SHA has progressed further than SHA-1 and if we examine the increases, the bits have also increased. SHA-2 uses 256 bit, which is accepted by different kinds of software. SHA-2 can even go up to 512, but it isn't as readily supported. With the increase in bits, there is a less likely chance of a collision, but it doesn't always mean that it'll be secure.

Reference no: EM132367607

Questions Cloud

Visuals for your presentation : Cis 500-Your project has been staffed-you are about to meet with team for first time.Initial impressions are important and you'll need visuals for presentation.
Morals-values and corporate social responsibility : Pick one of the following terms for your research: Morals, principles, values, corporate social responsibility, or ethical culture
Google information system strategy support business strategy : How does Google's information systems strategy support its business strategy?
About enterprise risk management : The research topic paper should present a general research topic about Enterprise risk management(ERM), narrow the topic down to a specific topics
Hashing algorithm responses : The MD5 was an algorithm that was used to secure information. Using 128 bit this was supposed to be a great way to keep security main priority until collisions
How do team conflicts affect productivity : How do team conflicts affect productivity and how can they be resolved quickly and effectively without harming the performance?
Non verbal communication : Students are to observe two or more adults unknown to observer.Discuss nonverbal communication, i.e. eye contact, body position and any other nonverbal behavior
Emerging technology briefing document : CMGT 557-Emerging Technology Briefing Document. The client has been so busy working and trying to build a customer base,
Team and team performance evaluation : BA 606-- What is meant by the "internal processes" of a team? Why is it important to manage both the internal processes and external opportunities/constraints

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd