COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0433
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 31 Pages
  • Format: Microsoft Word
  • Views: 1.6K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

CHAPTER ONE: INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Cryptography is an effective way of protecting sensitive information that is stored on media or transmitted through network communication paths.

Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals because most protocols can be broken into and the information can be revealed if the attacker has enough time, desire, and resources. Consequently, a more realistic goal of cryptography is to make obtaining the information too work-intensive to be worthwhile to the attacker and this is done through encryption.

The first encryption methods dated back to four thousand years ago and were considered more of an ancient art. As encryption evolved, it was mainly used to pass messages through hostile environments of war, crisis, and for negotiation processes between conflicting groups of people. Throughout history, individuals and governments have worked to protect communication by encrypting it. As time went on, the encryption algorithms and the devices that used them increased in complexity, new methods and algorithms were continually introduced, and it became an integrated part of the computing world.  Smith,A(2004)

While cryptography is the science of securing of data, cryptanalysis is the science of analyzing and breaking secure communication. Cryptology embraces both cryptography and cryptanalysis. In order words, it is the coding of plaintext and at the same time decoding it. (Smith 2004)

 Cryptanalysis involves the process of an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination and luck. In order words, cryptanalyst are also called attackers.

Data that can be read and understood without any special method is called plaintext or clear text. The method of disguising plaintext in such a way as to hide its substance is encryption. The encrypted plaintext (which is unreadable) is known as the cipher text. The process of converting the cipher text back to the plaintext is decryption.

Cryptography can be strong or weak. The cryptographic strength can be measured in the time and resources it will take to recover the plaintext.  (Smith.2004)     

Cryptography currently plays a major role in many information technology applications. For example, when engaging in electronic commerce, customers provide their credit cards numbers when purchasing products. If the connection is not secure, an attacker can easily obtain this sensitive data. In order to implement a comprehensive security plan, the following must be provided:

a)     Confidentiality: Information cannot be observed by an unauthorized party. This is accomplished through public key and symmetric key encryption.

b)    Data security: Transmitted data within a given communication session cannot be altered in transit due to error or an unauthorized party. This is accomplished through the use of hash function and message authentication codes(MACs)

c)     Message authentication: Parties within the given communication session must provide certified proof validating the authenticity of a message. This is accomplished through the use of digital signatures. The only communicating party that can generate a digital signature that will successfully verify as belonging to the originator of the message is the originator of the message. This process validates the authenticity of the message (it shows if the acclaimed originator of the message is really the actual originator of the said message)

d)    Non repudiation: in this case neither the sender nor the receiver of the message may deny transmission. This is accomplished through Digital Signatures and third party notary services.     

e)     Entity authentication: Establishing the identity of an entity such as person or device.

f)      Access control: controlling access to data and resources is determined base on the privilege assigned to the data and resources as well as the privilege of the entity attempting to access the data and resources. Schneier Bruce (1996)

 1.2 STATEMENT OF PROBLEM

Cryptography is all about securing information from a third party and also validating the authenticity of the information. The major problem faced in cryptography is that of key management. This is the numeric value used by an algorithm to change information (encryption) and validate the information (digital signatures) making sure the information is secured and visible only to individuals who have the corresponding key to recover the information and verify the authenticity of the information.

1.3 OBJECTIVES OF THE STUDY

The aim of this project is to create a web based implementation of CRYPTOGRAPHY HASH FUNCTION algorithm

The objectives are as follow:

a.     To implement the HASH FUNCTION algorithm

b.     To implement cryptography using SHA5, MD5 and MD45 algorithm.

c.      To make comparism of SHA5, MD5 and MD45

d.    To create a user friendly application.

1.4 SCOPE AND LIMITATION

The scope of this study is an examination and implementation of HASH FUNCTION algorithm as a public-key cryptography method with digital signature as authentication for a safe communication on text files only. Other encryption algorithms and authentications are not considered.

1.5 DEFINITION OF TERMS

PLAINTEXT or Clear text: The original message that can be read or understood without any special measures.

 CIPHER TEXT: or the encrypted message algorithm. The method of disguising the plaintext in such a way as to hide its substance is encryption.

     

ENCRYPTION:  Is the method of disguising the plaintext in such a way as to hide its substance is encryption

DECRYPTION: is the process of getting the original message back is called decryption. To encipher is to transform data into an unreadable format. To decipher is to transfer data into a readable format

CRYPTOLOGY: is the study of cryptography and cryptanalysis. 

CRYPTOGRAPHY: is the science of securing data,

 CRYPTANALYSIS: is the practice of analyzing and breaking secure communication without a key. A key is the secret sequence of bits and instructions that governs the act of encryption and decryption. 

CRYPTOGRAPHIC ALGORITHM: is a set of mathematical rules used in encryption and decryption. An application (either a hardware component or programmed code) that provides encryption and decryption is a cryptosystem.

CRYPTOSYSTEM: is the strength of cryptography is determined by the length of the key which is in bits. In order words, plaintext is simply binary data (bits).

COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0433
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 31 Pages
  • Format: Microsoft Word
  • Views: 1.6K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0433
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 31 Pages
    Format Microsoft Word

    Related Works

    CHAPTER ONE: INTRODUCTION 1.1 BACKGROUND OF THE STUDY Cryptography is an effective way of protecting sensitive information that is stored on media or transmitted through network communication paths. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals because most... Continue Reading
    ABSTRACT The sole aim of this research work is comparison and formulation of industrial Bar Soap and detergent. The major expert of this project deals with quality control processes in the production of a high quality bar soap and detergent. In synthetic detergent which was developed... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1.     BACKGROUND OF THE STUDY Gender is clearly seen as economic, social and cultural features, qualities and chances related with being either a male or female. Basically in most societies, men and women are totally different from each other and this is seen in their activities and business, and also their access... Continue Reading
    ABSTRACT Stabilized adhesive was developed and produced. The development was made by the production of samples of the adhesive with varied quantities of the active ingredients and the additives. From the various formulations made, it was observed that formulations A is the best for... Continue Reading
    ABSTRACT Lymphatic filariasis (LF) is caused by infection with threadlike worms called Wuchereria bancrofti. There had been different methods of diagnosing Filariasis. The two major diagnosing method is the Filariasis Test strip and the Microscopy test. This project is to compare the efficiency between the Microscopy test and Filariasis Test Strip... Continue Reading
    ABSTRACT This research work took theoretical and empirical studies that have been done over the past years on sorting algorithms and its variants. The study includes a comparative sorting algorithms (i.e. Bubble sort, shell sort, straight insertion sort quick sort, simple sort etc.) the same criteria such as... Continue Reading
    Abstract The public transport industry is an essential part of people’s lives. However, the problem associated with the local public transport industry is, travellers usually get frustrated when waiting for a bus to arrive at a bus stop due to uncertainty on when the bus may arrive or if it may arrive at all. This leads to anxiety on the part of... Continue Reading
    ABSTRACT The topic of the study was analysis of students use of facebook comparism; academics relationship/interaction uses. This study intends to analyze students’ use of facebook to know if they use them for social interaction or for academic purposes. The general purpose of the study is to analyze students’ use of facebook, to ascertain if... Continue Reading
    ABSTRACT The topic of the study was an analysis of students' use of Facebook comparison; academics relationship/interaction uses. This study intends to analyze students’ use of Facebook to know if they use them for social interaction or for academic purposes. The general purpose of the study is to analyze students’ use of Facebook, to... Continue Reading
    ABSTRACT Internal s o r t i n g a l g o rithms constitute a class of util ity prog rams that are widely used in performi n g rout i n e comput i n g operations . This thesis exam i n es t h e t h eory and structu res of these algorithms and i l l ustrates t h e i r basic principles w i t h f l owcharts and tabular presentations. PASCAL codes were... Continue Reading
    Call Us
    whatsappWhatsApp Us