Pfleeger, A Hash Function Is Used For Term Paper

PAGES
2
WORDS
603
Cite

¶ … Pfleeger, a hash function is used for the provision of message integrity checks and digital signatures. It is a transformation that takes an input and returns a fixed-size string. The basic requirements for a cryptographic hash function are that its input can be of any length but its output has a fixed length. It is said to be a one-way function if it is simply hard to invert. If, given a message, it is computationally infeasible to find a message then it is said to be a weakly collision-free hash function. A strongly collision-free hash function is one for which it is computationally infeasible to find any two messages. 2.The use of SSL ensures that SSL servers and clients can be configured to use only specific cryptographic algorithms.

3.Pfleeger's method for costing requires calculation of expenses and costs associated with delivering a cost effective security system based on risk analysis of potential risks from hackers posed...

...

List three commonly used attacks (not a guess, but as reported in the literature), and describe the operation of each type.
Remember this is a two-part question, first identify the attacks, and then describe how each works.

A denial-of-service attack is a type of attack that is designed to bring the network to its knees by flooding it with useless information. In this type of attack, for example, a smurf attacker sends PING requests to an Internet address, where it is swamped with replies to echo requests. Denial of service attacks do not directly impinge upon the hardware of a system, unlike viruses, which impinge upon a system's programs and run against the user's wishes.…

Sources Used in Documents:

Works Cited and Referenced

Pfleeger, Charles P. (2003). Security In Computing. Third edition. New York: Prentice Hall.

Webopedia. (2004). Internet computer search engine. http://www.webopedia.com.


Cite this Document:

"Pfleeger A Hash Function Is Used For" (2004, March 23) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/pfleeger-a-hash-function-is-used-for-163531

"Pfleeger A Hash Function Is Used For" 23 March 2004. Web.25 April. 2024. <
https://www.paperdue.com/essay/pfleeger-a-hash-function-is-used-for-163531>

"Pfleeger A Hash Function Is Used For", 23 March 2004, Accessed.25 April. 2024,
https://www.paperdue.com/essay/pfleeger-a-hash-function-is-used-for-163531

Related Documents

hashes can be attacked. In addition, describe some scenarios where a hash has been used as part of an authentication scheme, and the validity of a particular authentication using that scheme have been challenged. Hashes are one type of a variety of cryptographic methods of providing a one-way encoding of information. A hash value can only be recreated using the exact same information again. "The cryptographic value of the hash

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware