Access Millions of academic & study documents

Isa201 Answer.edited

Content type
User Generated
Subject
Computer Science
School
SHNU
Type
Homework
Showing Page:
1/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: CISCO PASSWORDS HASHES DISCUSSION Cisco Passwords Hashes Discussions University Affiliation Student Name Date 1 CISCO PASSWORDS HASHES DISCUSSION 2 Part 1 Password Hashes A Passwords is a secret string of different characters whose purpose is to authenticate access in various applications which include accounts and databases and at the same time protecting them from unauthorized access. It is advisable that passwords should be stored in the human mind for easy recollection. However, many are the times that people forget or lose these passwords knowingly or unknowingly and a process, known as cracking, has to be undertaken to recover or change the password for access. A hash is a representation of data including music, names, and article among others using unique strings of characters. There are different sets of hashing algorithms which include MD5 which returns a 32 unique character has on any data fed, SHA1 returns 40 unique character hash on any data fed, and SHA256 returns 64 character hash on any data fed. Password hashing is secure since it is a one-way operation and therefore cannot be reversed. However, experienced attackers or hackers are coming up with alternative ways of manipulating hashes to gain unauthorized access (Tatlı, 2015). Computer scientists and mathematicians, on the other hand, are constantly coming up with new designs more advanced hashes that have lower possibilities of manipulation. Password Cracking Tools or Websites for Cisco ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents