Thursday, January 28, 2010

Answer 2 Cryptography

Step1

First of all i download a compressed folder Md5 using the website

md5deep.sourceforge.net


Step5,6

After downloading and extracting the file i make a microsoft word document saved with the name country1.doc in the same folder that my snapshot is showing in step5,6.


Step9
In command prompt i entered MD5deep country1.doc to start the application that creates an MD5 hash of country1.doc
The ciphertext length of this hash is 128 bit.



Step11
This time i create another file name country2.doc without fullstop that i written in it and saved it in the same folder.




Step13
In command propt again i entered md5 country2.docto start the application


step14

Hashes is 32 characters

Now using the sha1deep for country1.docx length is 40 characters

Now using whirlpooldeep length is 128 for country1.docx


Now for country2.docx using whirlpooldeep length is 128 but characters are different.

References:-

The is done using SMAC 2.0 from the website:

www.klcconsulting.net/smac ,

and it can be found in the book "Security+ Guide to Network Security Fundamentals" 2008 by Mark Ciampa (page 222, Project 6-3).

Case project11.1

Hases using beside Atm's and paswords


Hashes is very useful technique today.it gives us very secure and safe way to keep information available for the authorised users. hashes are commanly used for downloading music, software and videos also. in this downloading a music or videos are stored in the web server and they have this hashes. when some one try to download this music or video the connection is established with the web server and than web server send a hash of a video or music to the local computer than when local computer download that music or video it compare the hash with origanal hash and than it allow the connection to download music or video.

Digital signature is the one of other example to use of hashes.Hashes are use to identify or authentication of source of information.I t is using for some message purpose systems. if the recipient can be sure, the message source. In addition, the recipient will be able to trace the source of their brand (Digital Signature, 2010).

References

http://www.cisco.com/en/US/docs/ios/12_2t/12_2t4/feature/guide/ft_md5v.html

From Cisco system, inc(1992,2010), retrived 25th jan 2010

http://www.hashtechnologies.com/about_us.htm

From hash technology Pvt Limited(2006.07), retrived 26th jan 2010

http://www.x5.net/faqs/crypto/q96.html

http://en.wikipedia.org/wiki/Cryptographic_hash_function

from digital signature wiki, retrived 26th jan 2010

1 comment: