AVILLA Assignment3.1 IT31S33
AVILLA Assignment3.1 IT31S33
Score
Leader:
AVILLA, JOHN IVAN C.
Members
BALLON, JOSHUA B.
CRUZ, CAMILLE
DALISAY, ANDRE JOSEPH N.
DANA, JOZEL
JEREZ, DANIEL JOSEPH N.
IT31S3
2. Discussion:
Data File
Identifying Security Fundamentals\Simple Hasher.exe
Scenario
As a company security administrator, you know that you will need to implement and support cryptographic
technologies to help keep company, employee, and customer data secure. To start with, you'll go over
some of the fundamentals of cryptography, as well as demonstrate how simple one-way cryptography
works.
3. Requirements
• Simple hasher program and other on-line hashing function tool
https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html
The hashing algorithm transformed your input into a fixed-length result (also known as a message digest).
It is infeasible to reverse this result in order to identify your plaintext input.
e) Remove the + from the input and select Calculate Hash.
f) Verify that a minor change has produced a significantly different result.
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function
https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html
If similar input produced similar hash results, the hashing operation would be predictable. Therefore,
hashing algorithms are designed so that even a minor change in input will lead to a major change in the
result.
g) Copy the Security text and paste it in the Enter input to hash text box several times.
h) Select Calculate Hash.
i) Verify that the hash result is the same length, despite the input being significantly longer.
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function
https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
https://emn178.github.io/online-tools/md5.html
If the length of the input influenced the hash result, the hashing operation would be predictable. Therefore,
hashing algorithms are designed to produce fixed-length message digests.
j) Close the Simple Hasher window.
4.2 Search for online hashing function tool and perform the same process in 4.1 and provide screen shots
https://www.dcode.fr/
http://hash-functions.online-domain-tools.com/
https://www.dcode.fr/hash-function
https://onlinehashtools.com/calculate-md5-hash
https://www.tools4noobs.com/online_tools/hash/
(Process performed using other online hashing tools (screenshots) are at 4.1)
BALLON, JOSHUA B
Comparing MD5 hash outputs from different online tools after eliminating a single letter was an
insightful learning of the algorithm's sensitivity to input alterations. It emphasized a fundamental feature of
cryptographic hashing that even modest changes in the input data yield entirely distinct hash output. This
characteristic strengthens MD5's security by ensuring data integrity. It also emphasizes the significance of
selecting robust hashing algorithms for data protection, as minor modifications should have a considerable
impact on the hash result. This activity has improved my awareness for hashing's function in cybersecurity
and data verification, stressing its reliability in ensuring data integrity.
CRUZ, CAMILLE
After performing this activity I was able to gain knowledge about hashing or hash function. I have
learned that a hash function converts digital information with a fixed number of characters. In doing the
activity we were tasked to use 5 hashing tools that we can find online to convert a specific message into a
hash. Through this activity I was able to realize that by using hash functions hackers will find it difficult to
access specific files. To conclude, by doing this activity I was able to gain knowledge about hash functions
in general.
In the aspect of cyber security, hashing is the one of the, if not, the best security measures in
providing encryption methods in information or data transfer. Also, by the use of hashing, it can keep your
data integrity, confidentiality, and safe transfer to the recipient. In this activity we find 5 hashing tools across
the browser and type a certain message that can convert into a series of numbers and letters. With the
same message used in 5 different hashing tools, they produced the same encryption. At the best of my
knowledge, hashing is just not in the simple word messages, but also it can be used in file or document
hashing. Doing this method, attackers or hackers will no longer or will have a hard time in able to identify
the message, file, or document that you are using or transferring.
DANA, JOZEL
Performing this activity is a huge help for me. This activity gives me a wide insight about hashing.
We perform the task given which is hashing through the use of different online tools. I gain new knowledge
about hashing and in terms of keeping our password safe, hashing is very essential. Hashing our
passwords can make it different from the real password. The people who handle our password will not be
able to see our actual password. Our password will turn to another value. By hashing our password it will
help our password to be protected from hackers. To conclude, from this activity it helps me to be engaged
in basic cryptography concepts.
I was introduced to the concept of hashing in the context of cyber security. Hashing is useful for
hiding private information such as passwords, credit card numbers, and the like from unwanted entries of
an intruder or hacker. Hashing makes it more difficult to trace specific information as the crucial information
is being encrypted with the use of an algorithm, and only the decrypter or a computer knows the specific
algorithm or key to decrypt.