Project 11-1

Go to MD5DEEP, click download then choose "Windows Binary".
The file is a extract file, so you will need to "Extract All" to anywhere.


This file MD5DEEP contains many different kind of hashing algorithms like MD5, SHA1, SHA256 and Whirlpool. Hashing is consider the most basic type of cryptographic, it protects your information from being edited or stolen from non-authorize people. When user A sends the letter "ABC" to user B it will be hashed before transmitted. If there's a middle man who intercept and edit the message, the hash will then be changed to a different type. When user B compare the hash with the originally, user B will notice that it have been edited. In this project, i will create a message and check the hash then, edit of the message to see if the hash actually change.


In order to continue with the hands-on, MD5 message is 128 bits so a short message will actually be a long code, MD5 is commonly used by LINUX operating system. SHA1 creates 160bits while SHA256 creates 256bits as stated by the name. Whirlpool creates hash at 512bits, which will be very long code, giving it higher end security to prevent those attackers.


Top: Shows the hash key for MD5 format.

The first output md5deep test.txt is using MD5 to hashed test.txt to 128bits. Editing the text file will result to changes of the hash. In the third output i hashed the same "test.txt" which end up showing different type of hash. The reason why it change, is because i edited a single symbol. This shows that if any man-in-the-middle attack happens, this hashing algorithms will then show that the file had been edited.

P1062344 posted during Saturday, August 7, 2010 at 10:53 AM

About Me

Name: Maverick Yong Kim Wee
Chinese Name: 杨 金 辉
Admin No: P1062344
Class: DISM 1A/01

No.of readers

Comments