ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 05 May 2017 My Price 9.00

Step 2: Ethical Hacking of MD5

Hello, I need assistance writing a paper if anyone is available. 

 

Authoring Guidelines

 

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the setting you have selected.

 

Lab Document Framework

 

Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5–10 sentences.

 

Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.

 

MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____

 

MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____

 

MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____

 

Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5–10 sentences.

 

Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.

 

Step 1: Best Use

 

Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use.

 

Step 2: Ethical Hacking of MD5

 

Crack the following three MD5 hash values and publish the plaintext in your lab document. See ethical hacking help at the bottom of this lab page for some hints.

 

MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c  

MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99  

MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03 

 

Step 3: Worst Use

 

Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use.

 

Key

Today, the MD5 and SHA-1 algorithms have been used to generate huge reverse look-up databases. These databases have web applications that provide a user interface. Google has also indexed the hash values. Therefore, no fancy mathematics are needed in this case, just access to the reverse look-up database.

Below are the hash values and the second letter of the input (the plaintext).

MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: ?e???
MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: ?a??????
MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: ?a????

Answer Key: Select (using Ctrl + A) all the text below this point if you are stuck and cannot crack the MD5 values.

MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c Devry
MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 password 
MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03 hacker

Answers

(11)
Status NEW Posted 05 May 2017 08:05 AM My Price 9.00

-----------

Not Rated(0)