Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
ilab cryptography
Document Authoring Guidelines
Each section will vary in size based on the requirements. Drive yourself to create a useful document for the setting you have selected.
Lab Document Framework
Best Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. It is generally about 5–10 sentences.
Ethical Hacking of MD5: Copy the following text into your lab document and fill in the blanks.
MD5 Hash 1: 4eefef62c45d66f55d89c515d8352c5c Input was: _____
MD5 Hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 Input was: _____
MD5 Hash 3: d6a6bc0db10694a2d90e3a69648f3a03 Input was: _____
Worst Use of MD5 or SHA-1: Outline a scenario where the MD5 or SHA-1 algorithms are put to poor or improper use. Start by stating what improper assumptions were made and how it did (or could) lead to a security compromise. It is generally about 5–10 sentences.
Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.
Step 1: Best Use
Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use.
Step 2: Ethical Hacking of MD5
Crack the following three MD5 hash values and publish the plaintext in your lab document. See ethical hacking help at the bottom of this lab page for some hints.
MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99 MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03
Step 3: Worst Use
Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use.