Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Select all of the following statements that are true. The md5sum algorithm is us

ID: 3819650 • Letter: S

Question

Select all of the following statements that are true.

The md5sum algorithm is used for detecting whether a file has been modified or become inadvertantly corrupted. The md5sum algorithm is not suitable for encryption. Crypto researchers have discovered a new, much faster, attack against the widely-used SHA-1 hashing algorithm. Xiaoyun Wang, one of the team of Chinese cryptographers that demonstrated earlier attacks against SHA-0 and SHA-1, along with Andrew Yao and Frances Yao, have discovered a way ... It appears that the RSA encryption tools that formed the basis of "secure" internet communication were broken by design from the beginning: https://en.wikipedia.org/wiki/RSA_BSAFE http://arstechnica.com/security/2014/01/how-the-nsa-may-have-put-a-backdoor-in-rsas-cryptography-a-technical-primer/If the USA can mandate "back doors" to break any encryption, what stops Iran, China, or Russia from demanding the same? Imagine the consequence: If you want to sell your product in China or communicate with any person in China, you must surrender your privacy. How will globally deployed exceptional access systems be governed to ensure that such systems would respect human rights and the rule of law? Furthermore, bad actors will ignore mandates and use strong encryption regardless. Mandating bogus encryption makes about as must mathematical sense and passing a law that Pi is exactly 3.0. https://www.schneier.com/blog/archives/2015/07/the_risks_of_ma.html https://www.newamerica.org/oti/ten-reasons-why-encryption-backdoor-mandates-are-a-bad-idea/In computer security, a "Trojan Horse" is a seemingly useful program that entices users to voluntarily install it and then degrades system security. A computer worm is a standalone malware computer program that does not replicate itself in order to spread to other computers. Unlike a computer virus, a worm does not need to attach itself to an existing program. A computer virus is a malware program that, when executed, replicates itself by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive.

Explanation / Answer

The following are the true statements:

ms5sum algorithm is used for detecting whether file has been modified or become inadevertantly corrupted.

Crypto researches have discovered a new much faster attck againest widely used SHA-1 hashing algorithm.


In computer security a Trojon Horse is a seemingly useful program that entices users to voluntarily install it and then degrades security.


A computer worm is standalone malware program that does not replicate itself in order to spend to other computers.


A computer virus ia a malware program that when executed replicates itself by inserting copies of itself into other computers,or the boot sector of hard drive.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote