0% found this document useful (0 votes)
20 views20 pages

AVILLA Assignment3.1 IT31S33

The document outlines an assignment focused on basic cryptography concepts, specifically hash functions, for a group of students. It includes intended learning outcomes, a discussion on hashing, requirements for using a simple hasher tool, and a series of tasks to demonstrate hashing functionality. Additionally, it features individual reflections from group members on their learning experiences related to hashing and its importance in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views20 pages

AVILLA Assignment3.1 IT31S33

The document outlines an assignment focused on basic cryptography concepts, specifically hash functions, for a group of students. It includes intended learning outcomes, a discussion on hashing, requirements for using a simple hasher tool, and a series of tasks to demonstrate hashing functionality. Additionally, it features individual reflections from group members on their learning experiences related to hashing and its importance in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

TIP-Quezon City

College of Information Technology Education

Assignment 3.1 Basic Cryptography Concept – Hash Function

Score

Leader:
AVILLA, JOHN IVAN C.

Members
BALLON, JOSHUA B.
CRUZ, CAMILLE
DALISAY, ANDRE JOSEPH N.
DANA, JOZEL
JEREZ, DANIEL JOSEPH N.

IT31S3

Engr. Junnel E. Avestro


Professor
IT021 (Usable Security)
Practice Set 3
Assignment 3.1 Basic Cryptography Concept – Hash Function
1. Intended Learning Outcome (ILO)
At the end of this practice set, the students are expected to:
• Determine the Basic Cryptography Concepts
• Distinguish hashing as part cryptography approach
• Discover other online hashing tools

2. Discussion:
Data File
Identifying Security Fundamentals\Simple Hasher.exe

Before You Begin


You will be using Simple Hasher, a rudimentary tool that demonstrates the concept of hashing.

Scenario
As a company security administrator, you know that you will need to implement and support cryptographic
technologies to help keep company, employee, and customer data secure. To start with, you'll go over
some of the fundamentals of cryptography, as well as demonstrate how simple one-way cryptography
works.

3. Requirements
• Simple hasher program and other on-line hashing function tool

4. Process and Deliverables


4.1 Examine hashing functionality.
a) From the course data files, double-click Simple Hasher.exe to open it.
b) In the Enter input to hash text box, type Security+
c) Select Calculate Hash.
d) Verify the hash result.
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function

https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html

The hashing algorithm transformed your input into a fixed-length result (also known as a message digest).
It is infeasible to reverse this result in order to identify your plaintext input.
e) Remove the + from the input and select Calculate Hash.
f) Verify that a minor change has produced a significantly different result.
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function

https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html

If similar input produced similar hash results, the hashing operation would be predictable. Therefore,
hashing algorithms are designed so that even a minor change in input will lead to a major change in the
result.
g) Copy the Security text and paste it in the Enter input to hash text box several times.
h) Select Calculate Hash.
i) Verify that the hash result is the same length, despite the input being significantly longer.
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function

https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html

If the length of the input influenced the hash result, the hashing operation would be predictable. Therefore,
hashing algorithms are designed to produce fixed-length message digests.
j) Close the Simple Hasher window.
4.2 Search for online hashing function tool and perform the same process in 4.1 and provide screen shots
https://www.dcode.fr/
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function
https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
(Process performed using other online hashing tools (screenshots) are at 4.1)

4.3 End of activity follow-up questions:


1. Considering that hashing is one-way and the hash is never reversed, what makes hashing a useful
security technique?
- Hashing is a valuable security technique due to its one-way nature, making it nearly impossible to
reverse the process and retrieve the original data from the hash. This property is crucial for
safeguarding sensitive information like passwords and encryption keys. Even minor input changes
result in drastically different hash values, enhancing data integrity and detecting tampering.
Additionally, hashing is computationally efficient, facilitating quick data verification. When combined
with salting for added security, hashing becomes a robust defense against unauthorized access
and data breaches, making it a fundamental component of modern cybersecurity measures.
2. Can you describe some real-world situations where you used basic security techniques such as
authentication, access control, and encryption?
- One of the most common real-world situations that a security technique can apply is the TBS or
Transactional-based system. One of the examples of TBS is E-commerce applications, one of the
present techniques is access control where the system makes sure that only the owner of the
account can make the transaction, An example of this is by sending an OTP on the specific mode
of payment that the user will use. Also, encryption is vital in this kind of system which will protect
the user’s payment information such as credit card number, digital account details, etc.
Authentication is present in most of the systems, especially in user-system interaction, one of
which is e-mail. E-mail uses an authentication method when the user logs in to his/her account on
a new or unfamiliar machine.
5. Group Observation
Through this activity, We learned about something called hashing or hash functions. It is like a
secret code that turns digital information into a set number of characters. It's like making a special lock for
our digital stuff. In our activity, we have a task to use five different online tools to turn a message into this
special code, or hash. What we realized here is that when we use these hash functions, it could make it
really tough for hackers to reverse engineer the hash message to the original message. In simple words,
it's like putting a super strong lock on our digital doors. This way, even if someone tries to break in, they
can't understand the secret code. We now know some sort of knowledge about how these hash functions
work to keep our stuff safe online.
6. Individual Synthesis
AVILLA, JOHN IVAN C.
In this group activity, I was introduced to the hashing function which is very essential to cyber
security. Having this kind of function can be very useful for many other applications such as encryption,
compression, and authentication for data. As It guarantees that once data has been subjected to hashing, it
becomes more challenging to go back to the original data based on the hash value. It is literally important
since it offers a form of data privacy that can be highly valuable in a diverse security context.

BALLON, JOSHUA B

Comparing MD5 hash outputs from different online tools after eliminating a single letter was an
insightful learning of the algorithm's sensitivity to input alterations. It emphasized a fundamental feature of
cryptographic hashing that even modest changes in the input data yield entirely distinct hash output. This
characteristic strengthens MD5's security by ensuring data integrity. It also emphasizes the significance of
selecting robust hashing algorithms for data protection, as minor modifications should have a considerable
impact on the hash result. This activity has improved my awareness for hashing's function in cybersecurity
and data verification, stressing its reliability in ensuring data integrity.

CRUZ, CAMILLE

After performing this activity I was able to gain knowledge about hashing or hash function. I have
learned that a hash function converts digital information with a fixed number of characters. In doing the
activity we were tasked to use 5 hashing tools that we can find online to convert a specific message into a
hash. Through this activity I was able to realize that by using hash functions hackers will find it difficult to
access specific files. To conclude, by doing this activity I was able to gain knowledge about hash functions
in general.

DALISAY, ANDRE JOSEPH N

In the aspect of cyber security, hashing is the one of the, if not, the best security measures in
providing encryption methods in information or data transfer. Also, by the use of hashing, it can keep your
data integrity, confidentiality, and safe transfer to the recipient. In this activity we find 5 hashing tools across
the browser and type a certain message that can convert into a series of numbers and letters. With the
same message used in 5 different hashing tools, they produced the same encryption. At the best of my
knowledge, hashing is just not in the simple word messages, but also it can be used in file or document
hashing. Doing this method, attackers or hackers will no longer or will have a hard time in able to identify
the message, file, or document that you are using or transferring.
DANA, JOZEL

Performing this activity is a huge help for me. This activity gives me a wide insight about hashing.
We perform the task given which is hashing through the use of different online tools. I gain new knowledge
about hashing and in terms of keeping our password safe, hashing is very essential. Hashing our
passwords can make it different from the real password. The people who handle our password will not be
able to see our actual password. Our password will turn to another value. By hashing our password it will
help our password to be protected from hackers. To conclude, from this activity it helps me to be engaged
in basic cryptography concepts.

JEREZ, DANIEL JOSEPH N.

I was introduced to the concept of hashing in the context of cyber security. Hashing is useful for
hiding private information such as passwords, credit card numbers, and the like from unwanted entries of
an intruder or hacker. Hashing makes it more difficult to trace specific information as the crucial information
is being encrypted with the use of an algorithm, and only the decrypter or a computer knows the specific
algorithm or key to decrypt.

You might also like