Unit 2 Assignment 2.docx IS 4560 Unit 2 Assignment 2 Vulnerability of a Cryptosystem The University used the Message-Digest algorithm 5 (MD5) in most of the areas at the University. MD5 provides the hashes to check
...
Unit 2 Assignment 2.docx IS 4560 Unit 2 Assignment 2 Vulnerability of a Cryptosystem The University used the Message-Digest algorithm 5 (MD5) in most of the areas at the University. MD5 provides the hashes to check for file integrity of downloaded files by using MD5 based certificates that have been approved by and internal Certificate Authority.The University also is using Cisco ASA firewall devices to create and sign digital certificates that authenticate the users and the systems. The default setting for the Cisco ASA firewall devices is the MD5. It was discovered in 2008 that theMD5 based systems had a problem; there were the feasibility of collision attacks. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate ("Research proves feasibility," 2008). That basically means that if an attacker can get a hold of a digital certificate, they could be able to gain access to information by creating a replica of the certificate but adding different information or contents to it According to the research, the likeliness of this vulnerability is very little due to the fact that most attackers do not know how to obtain rogue certificates. There are tools that exist that will assist the attackers in the creation of rogue certificates. The attacker sometimes does not have commonly learned knowledge to do this without practice and time as well as connection or a point of contact at a Ce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]