Title | Critical Thinking Assignment3-5 |
---|---|
Author | Dallas Rosenthal |
Course | Applications in Information Security |
Institution | State College of Florida, Manatee-Sarasota |
Pages | 1 |
File Size | 45.3 KB |
File Type | |
Total Downloads | 15 |
Total Views | 167 |
Critical Thinking Assignment...
Cr i t i c alThi nki ng35:Has hAl gor i t hm Compar i s on Re s e ar c ht hedi ffe r e nthas hal gor i t hms( Me s s ag eDi g e s t ,Se c ur eHa s hAl g or i t hm,and RI PEMD)a ndt he nc r e a t eat abl et ha tc ompar e st he m.I nc l udet hes i z eo ft hedi g e s t ,t he numbe rofr oundsne e de dt oc r e a t et hehas h,bl oc ks i z e ,whoc r e a t e di t ,wha tpr e vi oushas h i twa sde r i v e df r om,i t ss t r e ngt hs ,andi t swe akne s s e s . Message Digest
Secure Hash
RIPEMD
Digest Size
128
160
128
# of rounds needed
4
80
48
512
512
512
Block Size Creator
Ronald Rivest
National Security Agency
TheRI PECon s or t i u m
Derivative
MD4
MD5
MD4
Strengths
Used as checksum
Good for identity revisions
No patent constraints & designed in open academic community
Weaknesses
Cryptographically broken and unsuitable for further use
Well funded opponents & one collision attack & length extension attack
Questionable security & chance of collisions...