ITT 307 Topic 3 DQ1

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

307

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

1

Uploaded by PeanutButterEater102

Report
Asymmetric Hashing algorithms have been around a long time. For example, MD5 has been used for authentication of numerous websites. In recent years however, between the increase in CPU performance and weak keys, MD5 no longer provides adequate protection. Research newer Hashing algorithms that can replace MD5. Select 3 and do a pro-con comparison of them. Which would you recommend? Why? How would you deploy this new algorithm in your organization’s website? Hello professor and class, One of the 128-bit hashing algorithms I would take into consideration to replace MD5 would be RIPEMD-128. The reasoning behind this is RIPEMD has been around since 1992, uses a pin-compatible replacement of MD5 and uses the same security argument as RIPEMD-160. RIPEMD-160 offers a step up from the 128-bit version so of the RIPEMD algorithms this would be my choice for security purposes. The flaw with 128-bit hashing algorithms is that they are easy to break. Another great hashing algorithm to replace md5 would be the 128-bit version of SHA-256. This algorithm has not been broken or hacked into to this date making it the most secure option. References Callaghan, P. (2020, August 19). Why you should use SHA-256 in evidence authentication. Pagefreezer Blog. https://blog.pagefreezer.com/sha-256-benefits-evidence-authentication#:~:text=The%20main %20reason%20technology%20leaders,some%20other%20popular%20hashing%20algorithms GeeksforGeeks. (2020, February 10). RIPEMD hash function. https://www.geeksforgeeks.org/ripemd- hash-function/
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help