CS 305 Module Five Coding Assignment Checksum Verification - Tolentino

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

305

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

1

Uploaded by UltraCamelMaster345

Report
CS 305 Module Five Coding Assignment Checksum Verification Template Instructions Using the instructions from the Module Five Coding Assignment Checksum Verification Guidelines and Rubric, replace the bracketed text with the relevant information in your own words. 1. Algorithm Cipher The cipher I used was the SHA-256 cipher. The SHA-256 cipher generates 32 bytes of data. It is a more secure way of hashing data, as well as reducing the chance of data collision. 2. Justification I used the SHA-256 since it is secure and presents little chance for data collision which is extremely important for the checksum verification’s main purpose of verifying data integrity. The more bits, the more data bins, the less chance of a data collision in a hash table, ultimately leading to a better way of verifying data integrity. 3. Generate Checksum You’ll submit your refactored code to your instructor. Your instructor will review it and this document. 4. V erification Insert a screenshot below of the web browser with your unique information. 1
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help