Security Arch and Design

djreglnfq
timer Asked: Sep 18th, 2015

Question Description

CYBR 515 Assignment 3_3.doc 

Attachment Checksum

MD5: 881EC2D248B0947566E1279D54BC1C36
SHA-1: 8B3DFB2E818F513ACE3C87BCF075DFF99D80C229


Unformatted Attachment Preview

Bellevue University CYBR 515, Security Architecture and Design Simple Hash Functions Name: _______________________________________________ Purpose: This worksheet provides experience working with simple hash functions. Instructions: Complete the steps below. 1. Familiarize yourself with the simple hash function on pp 68-69 of your text. 2. Familiarize yourself with the American Standard Code for Information Interchange (ASCII) chart listed in your reading assignment. 3. Using the ASCII chart as a guide, convert the following phrase to hexadecimal and then binary by using the table below: Secure Text. Please note that this sentence is case sensitive, and that there is a space between the two words and a period after the second word. This hash function uses a block size of 8. The first line of this table is completed to provide an example of how it is done. S e c u r e Hex 53 27 0 26 1 25 0 24 1 23 0 22 0 21 1 20 1 T e x t . XOR 4. Using the XOR function, compute the value for each column and enter it in the space provided. 5. Convert your hash value to hexadecimal and record it here: ___________________________ Bellevue University CYBR 515, Security Architecture and Design Simple Hash Functions Name: _______________________________________________ Purpose: This worksheet provides experience working with simple hash functions. Instructions: Complete the steps below. 1. Familiarize yourself with the simple hash function on pp 68-69 of your text. 2. Familiarize yourself with the American Standard Code for Information Interchange (ASCII) chart listed in your reading assignment. 3. Using the ASCII chart as a guide, convert the following phrase to hexadecimal and then binary by using the table below: Secure Text. Please note that this sentence is case sensitive, and that there is a space between the two words and a period after the second word. This hash function uses a block size of 8. The first line of this table is completed to provide an example of how it is done. S e c u r e Hex 53 27 0 26 1 25 0 24 1 23 0 22 0 21 1 20 1 T e x t . XOR 4. Using the XOR function, compute the value for each column and enter it in the space provided. 5. Convert your hash value to hexadecimal and record it here: ___________________________
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Content

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors