Tuesday, February 9, 2010

ITC 358 Ass02 _Task02

Step 01
Hash Generator program can be downloaded from the followiing URL as shown in the figure below.




Step 05
In the process of generating md5deep Hash , I'm writing some text in the Ms Word 2003 to show some the effects of it.



Step 06
Now I saved the following document as the filename as Country1.doc.




Step 09
Now to start the application  "MD5DEEP" , to generate some hash function, on the designated location of the file, I typed the following md5deep conutry1.doc command as follow.



The length for this Hash is 64 bits.

Step 10
This is the process of generating the Hash for the accompanying documentation file MD5DEEP.TXT


The result for the application, comes as the length of this hash is 64 bits which is very similar to the length of the country1.doc, since it's the accompanying documentation file of the MD5DEEP application the strength of this particular document is quite different and higher is rate than of Country1.doc, user created file.

Step 11
Again to try different with different scenario , I'm opening the same Country1.doc file.




Step 12

Now here, i have removed the period at the end of the sentence and saved the document as Country2.doc




Step 13

To create the MD5 hash for the Country2.doc, I did the following action.



The difference to the hash has been to the different way but the size remain same, although the data in the following document is same as Conutry1.doc but removing the period made such changes.
Step 14

Following is the screenshot for the more hash functions



The comparasion result between Country1.doc and Country2.doc file with the variuos hash application are as follows in the Respective order.

Application   Length of Country1.doc Length of  Country2.doc  Comment
MD5DEEP         128 bits                               128 bits                      Non Identical
SHA-1              160 bits                             160 bits                      Non Identical
SHA-256          256 bits                              256 bits                      Non Identical
Whirlpool          512 bits                             512 bits                        Non Identical.


Reference:
P. Dalmaris. Security + Guice to the Network Security Fundamentals, Third Edition, Chapter 11, Basic Cryptography, Lecture Slides

No comments:

Post a Comment