Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / write a response for the following post What is a hash value, and why do you think it is important? In cryptography, hash value helps with the authentication fingerprint of the sender’s private key

write a response for the following post What is a hash value, and why do you think it is important? In cryptography, hash value helps with the authentication fingerprint of the sender’s private key

Sociology

write a response for the following post

What is a hash value, and why do you think it is important?

In cryptography, hash value helps with the authentication fingerprint of the sender’s private key. The hash value is a string of values, generated from the hashtag algorithm. By altering the content, the value of the hash will change also. This identifies if the file has been altered or not because the numerical value will change if altered. The website, OmniSecu.com (2021) describes the three common hash values are as follows: 

MD5 (Message Digest) – “MD5 Hashing Algorithm was invented by RSA Labs (Ronald Rivest) in 1991. MD5 was invented to replace its previous version, MD4. When Data is fed to the MD5 Hashing Algorithm, it generates a 128-bit Hash Value String as a 32-digit hexadecimal number. Hash Value Collisions are reported for MD5 Hashing Algorithm.” (para. 3) 

SHA1 (Secure Hash Algorithm 1)– “SHA-1 Hashing Algorithm was invented by United States National Security Agency in 1995. When data is fed to SHA-1 Hashing Algorithm, it generates a 160-bit Hash Value String as a 40 digit hexadecimal number.” (para. 4) 

SHA-2 (Secure Hash Algorithm 2)- “SHA-2 Hashing Algorithm was designed through The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in 2001. SHA-2 is a family of two Hash Algorithms with different block sizes. One of it is called as SHA-256 and other is called as SHA-512. Main difference between SHA-256 and SHA-512 is that SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are six types of SHA-2 Hashing Algorithms. They are SHA-256, SHA-512, SHA-224 (224-bit truncation of SHA-256), SHA-512/224, SHA-512/256 and SHA-384 (224-bit, 256-bit 284-bit truncations of SHA-512). SHA-2 has a much higher level of security than its predecessor SHA-1. SHA-2 family Hashing Algorithms will replace SHA-1 in near future.” (para.5) 

Explain how a hash value can be made secure to provide message authentication. 

In all my reading, the biggest way to make a hash value more secure is to use an SHA-2. This is because it offers different bit sizes, which generate the hash value. This is a great asset because the SHA-2 has different block sizes which include six different algorithms. 

Provide an example as it applies to your current job or life. 

At work, I don’t/can’t store any of my passwords on the server. But I have an android phone and Google account. Whenever I log into an app for the first time, my device will ask me if I want to store the password. When I select yes, Google stores the information for that app and password under my profile. But they can’t store it in plaintext for everyone to see, so when the password is saved it is running through a hash function. This creates the hash digest that is then stored on Google’s server under my profile. 

What are the benefits of implementing hash values? 

Some benefits of hash values are whenever a file is tampered with; the users/receivers are notified that the message/content of the file has been changed from the original sent message/content. If any part of the input message (file, email, software, app, etc.) has changed from the original sent form, the file can’t be opened. Once a hash value has been added to a file it can’t be reversed. Even if a hacker knows the algorithm used, still not an easy process to try to figure out. This explains why hash functions have been in use for so long. The biggest benefit of a hash value is without the algorithm and private key, the value just looks like a digital time stamp or code. No form of reference to input plaintext. 

References 

Stallings, W. (2021, July 24). Cryptography and Network Security. Retrieved from AIU Vital Source: https://aiu.vitalsource.com/#/books/9780134444635/... 

What are Hash values? Important Hash value Algorithms MD5, SHA-1 and SHA-2. (2021, July 29). Retrieved from OmniSecu.com: https://www.omnisecu.com/tcpip/what-are-hash-value...

 

This is the post made by Dante Smith
What is a hash value, and why do you think it is important?

In cryptography, hash value helps with the authentication fingerprint of the sender’s private key. The hash value is a string of values, generated from the hashtag algorithm. By altering the content, the value of the hash will change also. This identifies if the file has been altered or not because the numerical value will change if altered. The website, OmniSecu.com (2021) describes the three common hash values are as follows:

MD5 (Message Digest) – “MD5 Hashing Algorithm was invented by RSA Labs (Ronald Rivest) in 1991. MD5 was invented to replace its previous version, MD4. When Data is fed to the MD5 Hashing Algorithm, it generates a 128-bit Hash Value String as a 32-digit hexadecimal number. Hash Value Collisions are reported for MD5 Hashing Algorithm.” (para. 3)

SHA1 (Secure Hash Algorithm 1)– “SHA-1 Hashing Algorithm was invented by United States National Security Agency in 1995. When data is fed to SHA-1 Hashing Algorithm, it generates a 160-bit Hash Value String as a 40 digit hexadecimal number.” (para. 4)

SHA-2 (Secure Hash Algorithm 2)- “SHA-2 Hashing Algorithm was designed through The National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in 2001. SHA-2 is a family of two Hash Algorithms with different block sizes. One of it is called as SHA-256 and other is called as SHA-512. Main difference between SHA-256 and SHA-512 is that SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are six types of SHA-2 Hashing Algorithms. They are SHA-256, SHA-512, SHA-224 (224-bit truncation of SHA-256), SHA-512/224, SHA-512/256 and SHA-384 (224-bit, 256-bit 284-bit truncations of SHA-512). SHA-2 has a much higher level of security than its predecessor SHA-1. SHA-2 family Hashing Algorithms will replace SHA-1 in near future.” (para.5)

Explain how a hash value can be made secure to provide message authentication.

In all my reading, the biggest way to make a hash value more secure is to use an SHA-2. This is because it offers different bit sizes, which generate the hash value. This is a great asset because the SHA-2 has different block sizes which include six different algorithms.

Provide an example as it applies to your current job or life.

At work, I don’t/can’t store any of my passwords on the server. But I have an android phone and Google account. Whenever I log into an app for the first time, my device will ask me if I want to store the password. When I select yes, Google stores the information for that app and password under my profile. But they can’t store it in plaintext for everyone to see, so when the password is saved it is running through a hash function. This creates the hash digest that is then stored on Google’s server under my profile.

What are the benefits of implementing hash values?

Some benefits of hash values are whenever a file is tampered with; the users/receivers are notified that the message/content of the file has been changed from the original sent message/content. If any part of the input message (file, email, software, app, etc.) has changed from the original sent form, the file can’t be opened. Once a hash value has been added to a file it can’t be reversed. Even if a hacker knows the algorithm used, still not an easy process to try to figure out. This explains why hash functions have been in use for so long. The biggest benefit of a hash value is without the algorithm and private key, the value just looks like a digital time stamp or code. No form of reference to input plaintext.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE