KINDLY JUST INTERACT WITH THE NUMBER 1 AND 2 AND EACH FOR125 WORDS FROM THE TUTOR VIEW POINT IS FINE THANKS A LOT1)What is a hash value, and why do you think it is important?“A hash value is a numeric...

1 answer below »

KINDLY JUST INTERACT WITH THE NUMBER 1 AND 2 AND EACH FOR
125 WORDS FROM THE TUTOR VIEW POINT IS FINE THANKS A LOT






1)






What is a hash value, and why do you think it is important?






“A hash value is a numeric value of a fixed length that
uniquely identifies data. Hash values represent large amounts of data as much
smaller numeric values, so they are used with digital signatures,” according to
learn.microsoft.com ( Sept. 2021). Hash values are useful when someone needs
checks for correct data being sent through insecure channels. It also checks to
see if the data someone has sent has been changed from the original.






Explain how a hash value can be made secure to provide
message authentication.






A Hash Value can be secured by," having a large
hash output, the more secure a Hash Value is considered to be”, according to
Judd C. ( March 2021 ). It would be very difficult to duplicate the data being
sent to someone, so coping with the hash or hashing, becomes difficult by
creating a mathematical algorithm to match the exact hash. These are used much
more within the military due to a majority of soldiers having secret
clearances.











2)






The hash value is used in forensic analysis and in
cryptography. It is used to identify and verify a piece of digital data. The
hash value is produced by taking a file and processing it through a
cryptographic algorithm and a unique numerical value. If modifications are made
the value of the hash will significantly change. A hash value is a result of a
calculation (hash algorithm) that can be performed on a string of text,
electronic file, or entire hard drive contents. The result is also a checksum,
hash code or hashes. Hash values are used to identify and filter duplicate
files (i.e. email, attachments, and loose files) from an ESI collection or
verify that a forensic image or clone was captured successfully(Value?,
n.d). Hash values are fixed in size, it detects if it’s been tampered with, the
most important to me is it's not reversible. It is gone if it’s a password. For
example, the lady in red forgot her password so the bank instead of sending her
the password the bank sends her a reset password form. The bank has all
passwords hashed. Hacker the hacker gets the password but can’t understand it
because it’s hashed. An example of hashing in my life is when I sign my
financial aid papers online Some of the uses of hashing include:









  • Digital

    signatures



  • Biometrics



  • Password

    storage



  • SSL/TLS

    certificates



  • Code

    signing certificates



  • Document

    signing certificates



  • Email

    signing certificates(Insights, 2020).








and When I forgot my password for my bank, they had me
reset the password.






There are benefits to implementing hash values like
verifying that the files are the same and making sure that the files are copied
correctly without having to open the files. It is a quicker and more secure way
of retrieving data. Because it is hashed the password is protected when hashed.
Hashing is one-way. Hashing cannot be reversed.











Answered Same DayNov 13, 2022

Answer To: KINDLY JUST INTERACT WITH THE NUMBER 1 AND 2 AND EACH FOR125 WORDS FROM THE TUTOR VIEW POINT IS FINE...

Shubham answered on Nov 13 2022
50 Votes
HASH VALUE
Table of Contents
Question 1    2
Question 2    2
References    3
Question 1
Hash value is t
he string value that results in the calculation of a hashing algorithm. It may have different uses and the main use of hash value is to determine the integrity of the data. It is important for securing and provides an adjustable method for retrieving the data as compared to other data structures (Sumagita et al. 2018). It provides a quicker view for arrays and lists. It is used in computer and digital forensics for ensuring and providing electronic evidence that cannot be altered. It provides robust, fast and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here