Question

In: Computer Science

Research the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD) and then compare them....

Research the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD) and then compare them. Do a write up on the each one of them (3 paragraphs total). Be sure to include the size of the digest, the number of rounds needed to create the hash, block size, who created it, what previous hash it was derived from, and its strengths and weaknesses. For your fourth paragraph, pick one hash algorithm and explain what you would use it for and why you would prefer to use that hash.

Be creative. I am looking for thoughtful responses, they do not necessarily have to be true.

Solutions

Expert Solution

Research on the different hash algorithms (Message Digest, Secure Hash Algorithm, and RIPMD)

1 Message Digest: A message digest is defined as a cryptographic hash function that contains the string of digits that are created by the one-way hashing formula.The message digest is designed in such a way that it protect the integrity of a piece of data or to detect any changes and alterations that takes place in any part of the media.In message digest the hash number basically represent the specific files that are contained for the protected works.

2 Secure Hash Algorithm: The secure hash algoritm is also called the SHA.This is the  family of cryptographic functions, that are designed in such a way that keep the data secured.This is work in such a way that the data are transfered using a hash function.This is an algoritm that consists of the modular additions,bit-wise operation and the  compression functions.

3 RIPMD: This RIPMD, stands for the RACE Integrity Primitives Evaluation Message Digest.This is basicaiiy a group of a  hash function.This is used in the Bitcoin standard.

Comparision between the different algorithms like Message Digest, Secure Hash Algorithm, and RIPMD:

Message Digest Secure Hash Algorithm RIPMD

1 The digest length: 128 bits 160 bits 160 bits

2 Numbers of steps: 64(4 rounds of 16) 80(4 rounds of the 20) 160(The 5 paired round of 16)

3The basis unit of processing:512 bits 512 bits 512 bits

4 The maximum message size: infinity(~) 2^64-1 bits   2^64-1 bits

5 Strengths :The error-checking functionality It also error-checking functionality Similar functions as SHA-1

6 Weaknesses :No collision resistant No collision resistant No collision resistant,

According to me i choose Secure hash algorithm .Because as we know that it is a family of the   cyptographic functions this is designed in such a way that it  keep data secured.It basically work by transfering the  data using a hash function.This hash function then produces the fixed-size string this seems like the original.This algoritm are designed in such a way that to be one-way functions,it means that it  transformed only into their respective hash values.

The most common application of SHA is that it is used for the encrypting passwords.It has the error-checking functionality.The best thing about the SHA is that it is fastest hashing function.This has the longer hash value that makes it  harder to break.So , all this points we can say that it is most secure hash algorithm.

THANKS , i think this will give you a better intuition about your questions. If you have any doubt feel free to ask in the comment section.


Related Solutions

Briefly describe some desirable properties of a robust message digest algorithm. Outline two distinct examples of...
Briefly describe some desirable properties of a robust message digest algorithm. Outline two distinct examples of how a message digest algorithm may be employed to ensure the integrity of data.
Research on the different Data Warehousing Software (at least 5). Compare and contrast them in terms...
Research on the different Data Warehousing Software (at least 5). Compare and contrast them in terms of: Vendor Functionality ETL process Platform Best feature Support What is Hadoop? Why is it important? What are the challenges of using Hadoop?
What are the different algorithms we may use to solve the 0/1 Knapsack problem? Compare and...
What are the different algorithms we may use to solve the 0/1 Knapsack problem? Compare and contrast the different methods.
Research email virus scanners and compare them to how host-based virus scanners work
Research email virus scanners and compare them to how host-based virus scanners work
This chapter discusses the different types of research design and you have read about them as...
This chapter discusses the different types of research design and you have read about them as well. For this entry, conduct a PubMed search and find two abstracts of studies both using a cross sectional design. The abstracts may be on any topic you chose-and they do not all have to be on the same topic. In your post, include each abstract and write about the distinguishing factors of the design used, and comment on whether or not you feel...
This chapter discusses the different types of research design and you have read about them as...
This chapter discusses the different types of research design and you have read about them as well. For this entry, conduct a PubMed search and find two abstracts of studies both using a cross sectional design. The abstracts may be on any topic you chose-and they do not all have to be on the same topic. In your post, include each abstract and write about the distinguishing factors of the design used, and comment on whether or not you feel...
Choose two different types of microscopy and compare/contrast them in detail.  If you were looking at a...
Choose two different types of microscopy and compare/contrast them in detail.  If you were looking at a typical liver cell using the two different types of microscopy, what structural details and organelles would be visible?   Compare and contrast DNA and RNA, including details of structure and function. What is protein modification?  Describe three examples of protein modification, as well as how the protein modification affects protein activity. How do you measure an enzyme’s performance? Describe how a competitive inhibitor and a non-competitive...
Research at least four different data loss prevention (DLP) products from four different vendors. Compare at...
Research at least four different data loss prevention (DLP) products from four different vendors. Compare at least six different functions and options. Based on your research which would you choose? What features make this product the optimum? Why? Write a summary of your research. Minimum 150 words for your response
Research the Web for service-level agreements of two different providers of cloud services and compare these...
Research the Web for service-level agreements of two different providers of cloud services and compare these based on availablity, security, and privacy. How do the agreements differ? are the agreements reasonable? Which provider woluld you select for your cloud infrastructure if you were to start a commpany?
List three TV programs that have older adults in them from different decades and compare how...
List three TV programs that have older adults in them from different decades and compare how adults are represented today compared to the past. 1. Program 1, current show or rerun and year of rerun 2. Program 2, current show or rerun and year of rerun 3. Program 3, current show or rerun and year of rerun 1. Describe how adults were portrayed in the programs you viewed. 2. Did the portrayal of adults conform to our stereotypes of aging?...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT