all the details are on the file below
1. What are the properties of hash functions?
2. Write your OWN code of computing SHA1 and compute the following hashes.
1. USF
2. Electrical Engineering
3. Crypto
You can verify the results of your code using: [login to view URL]
Submit your code and screenshots of your results.
3. Bob designed a new scheme to detect whether a message is modified by an attacker (protecting data integrity). The scheme is to append to each message a SHA -256 hash of that message. Explain the vulnerability of Bob’s design.
4. Bob designed another new scheme to detect whether a message is modified by an attacker (protecting data integrity). The scheme is to append to each message a SHA - 256 hash of that message, then encrypt the whole appended message using AES with a known key to the public. Explain the vulnerability of Bob’s design.
5. A company is selling an artifact worth millions of dollars. Many interested buyers are in the bidding process, which works as follows. Each buyer sends the information of his/her final number (e.g., $1,000,000.00) to the company to show his/her commitment. And the number must be kept confidential from other buyers and even the company before the deadline. After the deadline, all numbers are released to all buyers and the company, then the buyer with the highest number wins. Design a HASH FUNCTION based scheme to secure the bidding process. Describe steps a buyer and/or the company should do.
Hello, how are you? I hope you have a bright day/evening from your side. I DO NOT OUTSOURCE I have been a freelancer for the past 8 years, I believe that my experience and skill in this background will prove to be of great help to you. Contact me to discuss more on the details
We are a team of Electrical and Electronics engineers and we are Excellent in the following areas:
• Embedded C Programming.
• VHDL/Verilog, LABView
• Microcontroller like Arduino, Raspberry Pi, FPGA, AVR, PIC and STM32.
• IDEs like Keil MDK V5, ATmel studio and MPLab XC8.
• PLCs / SCADA
• PCB Designing-Proteus, Eagle.
• Multisim
• IOT Technologies like Ethernet, GSM GPRS.
• HTTP Restful APIs connection for IOT Communications.
Also we have good command over report writing, I can show you many samples of our previous reports. Kindly consider us for your project and text me so that we can further discuss specifically about your project's main goals and requirements.
We can deliver your project efficiently at a time. If you choose me, I think you won't regret. Best Regards.
Also we have good command over REPORT WRITING, We can show you many samples of our previous reports. We can discuss further details in the message box.
hy dear
i just read out your description and i am interested in your project.
i am expert in cryptography and hashing.
if you need quality work than feel free to contact me
Thanks
There are four main characteristics of a good hash function: 1) The hash value is fully determined by the data being hashed. 2) The hash function uses all the input data.