First of all i download a compressed folder Md5 using the website
md5deep.sourceforge.net
Step5,6

Step9


Step11

Step13

step14


Now using the sha1deep for country1.docx length is 40 characters

Now using whirlpooldeep length is 128 for country1.docx

Now for country2.docx using whirlpooldeep length is 128 but characters are different.
References:-
The is done using SMAC 2.0 from the website:
and it can be found in the book "Security+ Guide to Network Security Fundamentals" 2008 by Mark Ciampa (page 222, Project 6-3).
Case project11.1
Hases using beside Atm's and paswords
Hashes is very useful technique today.it gives us very secure and safe way to keep information available for the authorised users. hashes are commanly used for downloading music, software and videos also. in this downloading a music or videos are stored in the web server and they have this hashes. when some one try to download this music or video the connection is established with the web server and than web server send a hash of a video or music to the local computer than when local computer download that music or video it compare the hash with origanal hash and than it allow the connection to download music or video.
Digital signature is the one of other example to use of hashes.Hashes are use to identify or authentication of source of information.I t is using for some message purpose systems. if the recipient can be sure, the message source. In addition, the recipient will be able to trace the source of their brand (Digital Signature, 2010).
References
http://www.cisco.com/en/US/docs/ios/12_2t/12_2t4/feature/guide/ft_md5v.html
From Cisco system, inc(1992,2010), retrived 25th jan 2010
http://www.hashtechnologies.com/about_us.htm
From hash technology Pvt Limited(2006.07), retrived 26th jan 2010
http://en.wikipedia.org/wiki/Cryptographic_hash_function
from digital signature wiki, retrived 26th jan 2010
This is absolutely brilliant!
ReplyDeleteSales Job Descriptions