We are going to try our hand at encryption and hashing of files for this assignment. We will be using AES, MD5 and SHA256. You can find your own tools for doing this, or you can use online tools, or tools built into your computer operating system. I’ve provided a couple of links below for your reference.
Extra Credit: Provide the Shannon Entropy for your encrypted text.
If you are successful in the above steps, I should be able to decrypt and hash your answer, arriving at the same results you did. Points are given for each step 2 through 7.
Resources
ASSIGNMENT 08 S01 Introduction to Psychology I Directions: Be sure to save an electronic copy…
Include a comprehensive, thoughtful and critical analysis to the arguments and perspectives of the readings…
Discussion Prompt: Plagiarism As a writer, one of the gravest errors to make is to…
Question 1: Write a Hypothetical. Write a legal memorandum analyzing what happened in the following…
You work at Happy Joe's family restaurant and want to see if customer meal satisfaction…
The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. Assignments submitted…
View Comments
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?