Data Networks > ASSIGNMENT > SEC 572 iLab Assignment 3 of 6: MD5 and SHA-1 - Graded An A+ (All)

SEC 572 iLab Assignment 3 of 6: MD5 and SHA-1 - Graded An A+

Document Content and Description Below

SEC 572 iLab Assignment 3 of 6: MD5 and SHA-1 Best Use of MD5: The first piece us understanding what MD5 (Message Digest Algorithm 5) is, MD5 is a one-way algorithm that is crea... ted through a 128-bit message digest from data input. The best use of MD5 hash’s can be used to give a value for a download a specific hash-code that is unique to that file. The can help verify that the message or document has not be altered; consider this as a failsafe if you are download a document off a website or transmitted from a p2p. “By verifying a published MD5 checksum and comparing MD5 checksum on record with the software provider with a downloaded file’s checksum, a user can be sure that the file is the same as that offered by the developers if a match occurs.” Below is an example of how MD5 works with the input and what the out-put would show. I have also included a site to help generate a MD5 string is you would like to test it out yourself. MD5 Hash Generator http://www.makeuseof.com/tag/md5-hash-stuff-means-technology-explained/ Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks. MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: Devry MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: password MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: hacker Worst Use of MD5: One of the worst uses of MD5 would be to store passwords. Anymore, there are websites that will be able to decrypt any information that has been transferred over to and MD5. Most of the time when passwords are stored and not randomly generated they are easily deciphered. With modern day processors and GPU(s) doing a brute force on a MD5 is easily cracked. Even if you needed a little more power, you can go to Microsoft or Amazon and rent out clusters for roughly 2 dollars an hour. This will help increase the accessibility of cracking the MD5. The issue runs into that fact that creating a super intense password such as “Wend$w987^wxow#)(lskw!!^$#@” will take much longer to decrypt but, the user will not be able to remember it. From here they will just write it down in a pad of paper next to their desk or a file on their computer; now it’s a quick social engineering and all the passwords will be in the hands of the enemy. References Hashkiller.co.uk,. 'MD5 Decrypter - MD5 Decryption, Free MD5 Decryptor, Online MD5 Cracker, MD5 Security'. N.p., 2015. Web. 18 Sept. 2015. Lewis, Don. 'The Hash Algorithm Dilemma–Hash Value Collisions'. Forensic Magazine. N.p., 2015. Web. 18 Sept. 2015. Tasker, Ben. 'Why You Shouldn't Be Using SHA1 Or MD5 To Store Passwords'. BenTasker.co.uk. N.p., 2013. Web. 18 Sept. 2015. [Show More]

Last updated: 2 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

113
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 22, 2023

Number of pages

4

Written in

Seller


seller-icon
Doc.Mukai Edyth

Member since 2 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Jul 22, 2023

Downloads

 0

Views

 113

More From Doc.Mukai Edyth

View all Doc.Mukai Edyth's documents »

Recommended For You

Get more on ASSIGNMENT »

$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·