logo

Principles and Methods in Cryptographic System | Report

   

Added on  2022-09-12

6 Pages576 Words14 Views
Running head: PRINCIPLES AND METHODS IN CRYPTOGRAPHIC
Principles and methods in cryptographic
Name of the Student
Name of the University
Authors note

PRINCIPLES AND METHODS IN CRYPTOGRAPHIC
1
Hashing Algorithms
In computer science the hash algorithms are the functions that are helpful in the
converting the contained data string in fixed length numeric string as output. Generated numeric
output string is smaller than original data of the file. The numeric strings generated using Hash
algorithms are collision-resistant. It is almost impossible to generate the same string with
different data in a file.
The MD5 algorithm operates on 512 bits at once and for this the content is padded. The
initial digest is calculated with every 512-bit message (Kale & Dhamdhere, 2018). This process
of adding the digest values are continued until the end of the content. Final digest is always 128
bit long.
The used text file and initial content is
Following is the list of the different hash values for the file with the initial content.

PRINCIPLES AND METHODS IN CRYPTOGRAPHIC
2
MD5: 3DA575C5A39DAA2573C24E2F05DE2CE4
SHA-512:
120857C7C274C0E2049279CB158FFE2863CD1367510BF5B25D748D3FB3B8B75C3934CB7
C995C9AE430865472B621704E7BE7904E7F1C031A25AC6B8C12863824
After the first edit, the content in the file;

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Techniques and Algorithms
|13
|3022
|459

Different Type of Hashing Algorithm
|4
|694
|21

Comparison of MD5 and SHA3 Hashing Techniques
|13
|3475
|89

Crypto Hashes and PKI Cryptography Assignment
|5
|1391
|186

World Interoperability Assignment PDF
|6
|1956
|35

Security in Computing: Electronic Espionage, Access Control, Encryption, Viruses, Web Security, and Network
|8
|1514
|266