The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Hello, I need assistance writing a paper if anyone is available.Â
Â
Authoring Guidelines
Â
Each section will vary in size based on the requirements. Drive yourself to create a useful document for the setting you have selected.
Â
Lab Document Framework
Â
Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5–10 sentences.
Â
Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.
Â
MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____
Â
MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____
Â
MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____
Â
Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5–10 sentences.
Â
Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.
Â
Step 1: Best Use
Â
Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use.
Â
Step 2: Ethical Hacking of MD5
Â
Crack the following three MD5 hash values and publish the plaintext in your lab document. See ethical hacking help at the bottom of this lab page for some hints.
Â
MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c Â
MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99Â Â
MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03Â
Â
Step 3: Worst Use
Â
Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use.
Â
Key
Today, the MD5 and SHA-1 algorithms have been used to generate huge reverse look-up databases. These databases have web applications that provide a user interface. Google has also indexed the hash values. Therefore, no fancy mathematics are needed in this case, just access to the reverse look-up database.
Below are the hash values and the second letter of the input (the plaintext).
MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: ?e???
MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: ?a??????
MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: ?a????
Answer Key: Select (using Ctrl + A) all the text below this point if you are stuck and cannot crack the MD5 values.
MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c Devry
MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 passwordÂ
MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03 hacker