Security Engineering/Cryptography
Security Engineering/Cryptography
Please respond to at least two main topics by Friday. Respond to at least two classmates by Sunday.
Topic |
Threads |
Posts |
Last Post |
---|---|---|---|
Domain 3 – Security Engineering/Cryptography Must post first. After reading this week’s materials, please respond to one or more of the following questions.
You must start a thread before you can read and reply to other threads |
|||
Domain 3 – Security Engineering/Site and Facility Security Must post first. After reading this week’s materials, please respond to one or more of the following questions.
You must start a thread before you can read and reply to other threads |
|||
Hashing – A Hands on Approach An MD5 hash is 128 bits. A SHA1 hash is 160 bits. A sha256 hash is 256 bits. A sha384 hash is 384 bits. A sha512 hash is 512 bits. Discuss some of the different types of hashes and indicate some good hashing tools for Linux and Windows. Are they command line tools or GUI tools? What does a hash prove? Why are hashes often used for download links? Here is a list of some hashes. You may elect to see if you can identify the name of the files associated with these hashes and explain what these files do as part of the discussion. 53245DB399AE003E82FDECB0871E66D3 E72A495A8E4AF5D09B9400CAF014D3D7 E0FB946C00B140693E3CF5DE258C22A1 57F0839433234285CC9DF96198A6CA58248A4707 9FBFE673241D831242219F158720DE3D B32189BDFF6E577A92BAA61AD49264E6 3B1333F826E5FE36395042FE0F1B895F4A373F1B 899BCDA15D5D03A968373B7081D9121F D3F39F5D391E9D2CE7EF8D11C429D0A3 |