Select Currency
Translate this page

COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS

Format: MS WORD  |  Chapter: 1-5  |  Pages: 48  |  727 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS

 

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Cryptography is an effective way of protecting sensitive information that is stored on media or transmitted through network communication paths.

Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals because most protocols can be broken into and the information can be revealed if the attacker has enough time, desire, and resources. Consequently, a more realistic goal of cryptography is to make obtaining the information too work-intensive to be worthwhile to the attacker and this is done through encryption.

The first encryption methods dated back to four thousand years ago and were considered more of an ancient art. As encryption evolved, it was mainly used to pass messages through hostile environments of war, crisis, and for negotiation processes between conflicting groups of people. Throughout history, individuals and governments have worked to protect communication by encrypting it. As time went on, the encryption algorithms and the devices that used them increased in complexity, new methods and algorithms were continually introduced, and it became an integrated part of the computing world.  Smith,A(2004)

While cryptography is the science of securing of data, cryptanalysis is the science of analyzing and breaking secure communication. Cryptology embraces both cryptography and cryptanalysis. In order words, it is the coding of plaintext and at the same time decoding it. (Smith 2004)

 Cryptanalysis involves the process of an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination and luck. In order words, cryptanalyst are also called attackers.

Data that can be read and understood without any special method is called plaintext or clear text. The method of disguising plaintext in such a way as to hide its substance is encryption. The encrypted plaintext (which is unreadable) is known as the cipher text. The process of converting the cipher text back to the plaintext is decryption.

Cryptography can be strong or weak. The cryptographic strength can be measured in the time and resources it will take to recover the plaintext.  (Smith.2004)     

Cryptography currently plays a major role in many information technology applications. For example, when engaging in electronic commerce, customers provide their credit cards numbers when purchasing products. If the connection is not secure, an attacker can easily obtain this sensitive data. In order to implement a comprehensive security plan, the following must be provided:

a)     Confidentiality: Information cannot be observed by an unauthorized party. This is accomplished through public key and symmetric key encryption.

b)    Data security: Transmitted data within a given communication session cannot be altered in transit due to error or an unauthorized party. This is accomplished through the use of hash function and message authentication codes(MACs)

c)     Message authentication: Parties within the given communication session must provide certified proof validating the authenticity of a message. This is accomplished through the use of digital signatures. The only communicating party that can generate a digital signature that will successfully verify as belonging to the originator of the message is the originator of the message. This process validates the authenticity of the message (it shows if the acclaimed originator of the message is really the actual originator of the said message)

d)    Non repudiation: in this case neither the sender nor the receiver of the message may deny transmission. This is accomplished through Digital Signatures and third party notary services.     

e)     Entity authentication: Establishing the identity of an entity such as person or device.

f)      Access control: controlling access to data and resources is determined base on the privilege assigned to the data and resources as well as the privilege of the entity attempting to access the data and resources. Schneier Bruce (1996)

 1.2 STATEMENT OF PROBLEM

Cryptography is all about securing information from a third party and also validating the authenticity of the information. The major problem faced in cryptography is that of key management. This is the numeric value used by an algorithm to change information (encryption) and validate the information (digital signatures) making sure the information is secured and visible only to individuals who have the corresponding key to recover the information and verify the authenticity of the information.

1.3 OBJECTIVES OF THE STUDY

The aim of this project is to create a web based implementation of CRYPTOGRAPHY HASH FUNCTION algorithm

The objectives are as follow:

a.     To implement the HASH FUNCTION algorithm

b.     To implement cryptography using SHA5, MD5 and MD45 algorithm.

c.      To make comparism of SHA5, MD5 and MD45

d.    To create a user friendly application.

1.4 SCOPE AND LIMITATION

The scope of this study is an examination and implementation of HASH FUNCTION algorithm as a public-key cryptography method with digital signature as authentication for a safe communication on text files only. Other encryption algorithms and authentications are not considered.

1.5 DEFINITION OF TERMS

PLAINTEXT or Clear text: The original message that can be read or understood without any special measures.

 CIPHER TEXT: or the encrypted message algorithm. The method of disguising the plaintext in such a way as to hide its substance is encryption.

     

ENCRYPTION:  Is the method of disguising the plaintext in such a way as to hide its substance is encryption

DECRYPTION: is the process of getting the original message back is called decryption. To encipher is to transform data into an unreadable format. To decipher is to transfer data into a readable format

CRYPTOLOGY: is the study of cryptography and cryptanalysis. 

CRYPTOGRAPHY: is the science of securing data,

 CRYPTANALYSIS: is the practice of analyzing and breaking secure communication without a key. A key is the secret sequence of bits and instructions that governs the act of encryption and decryption. 

CRYPTOGRAPHIC ALGORITHM: is a set of mathematical rules used in encryption and decryption. An application (either a hardware component or programmed code) that provides encryption and decryption is a cryptosystem.

CRYPTOSYSTEM: is the strength of cryptography is determined by the length of the key which is in bits. In order words, plaintext is simply binary data (bits).

  DOWNLOAD THE COMPLETE PROJECT

COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Merry From BSU
I am now a graduate because of iprojectmaster.com, God Bless you guys for me.
Excellent
Ibrahim Muhammad Muhammad
Usmanu danfodiyo university, sokoto
It's a site that give researcher student's to gain access work,easier,affordable and understandable. I appreciate the iproject master teams for making my project work fast and available .I will surely,recommend this site to my friends.thanks a lot..!
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
JONNAH EHIS
Ajayi Crowther University, Oyo
I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for COMPARISM OF SHA 1, SHA 256, AND MD 5 ALGORITHMS, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!