Discussion 5 Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a

Discussion 5

Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a 128-hash value. MD5 is now considered obsolete because of the “birthday problem”. Notice the increase from 160-bit to 128-bit. Do you think more bits for the hash value makes the algorithm better? Explain your position.

Requirement

Correct

Partially Correct

Explanation of MD5

30%

15%

Explanation of SHA-1

30%

15%

Justification

35%

20%

APA Format, 12 pt font, Times New Roman, and 250 words or more

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit
Reviews

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

  Discussion Seven – Social Networking Social networking Web sites create online communities of Internet users that eliminate barriers created by time,

  Discussion Seven – Social Networking Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact

Contingency planning is an important part of the cybersecurity process. It is necessary to have a plan for mitigating and recovering from damage. In your

Contingency planning is an important part of the cybersecurity process. It is necessary to have a plan for mitigating and recovering from damage. In your journal, you will reflect on cryptography and contingency planning. Specifically, you will discuss cryptography, keys, algorithms, business continuity, and disaster recovery. Your journal entry should