Thursday, February 27, 2020

Cryptology Assignment Example | Topics and Well Written Essays - 2500 words

Cryptology - Assignment Example Hash functions are arguably the most important of all the encryption algorithms since they help in the prevention of external attacks. They are usually used in most of the applications that require very high security. They are also widely used in the specification of most communication protocols like IPsec and WAP. They typically serve message authentication codes and also help in provision of digital signatures or in some cases, they generate random numbers. MD5 and SHA-1 are the most common of the hash functions (Biham and Chen, 2004). MD5 Algorithm Data filling The MD5 algorithm usually adds the supplement immediately after inputting of the data thereby making the whole length of the mod 512=448. This can be represented as K*512+448 BITS WHERE K IS an integer. Add length Usually, a sixty four bit data b is used to dente the original length of the data while an independent b is used to two thirty two bit blocks. In the event that b>264, we will have to extend the length to multiple s of five hundred and twelve. This implies that the length will become times of sixteen double bytes. MD5 algorithm usually saves the data in an array. The syntax of such an array is given by M [0†¦N-1] Where N is in time of sixteen. Initialing of variables If four thirty two but variable named A, B, C, and D were to be defined, they would be initialized as A=0*01234567, B=0/889abcdef, C=0*fedcba98 and D=0*76543210. In this case, the data will be output in the same sequence that is, A, B, C, D. SHA-1 Algorithm This is also an important hash algorithm which is actually based on the MD4 principle. The algorithm actually produces 160 bit output which means that SHA-1 usually needs a set of five thirty two bit registers. However, the similarity between SHA-1 and MD5 is that both of them use a similar approach to message digesting. The SHA-1 algorithm has a total of four distinct rounds of iterative. Each of these rounds has its own twenty steps of operations. If you were to initial ize five variables namely A, B, C, D, and you would have:- A= 0x67452301 B=0xefcdab89 C=0x98badcfe D=0x10325476 E=0xc3d2e1f0 SHA-1 was traditionally thought to be the most secure hash algorithm and it is probably one of the main reasons why it is the current FIPS secure hash standard (Merkle,1990). Principle of operation of the two algorithms Generally the design of the hash algorithms is usually based on the Merkle-Damgard iterative structure. This is since the structure allows for arbitrary length in the messages that are sent. The hash algorithms typically work by dividing the input into different blocks of predetermined lengths. Each of the blocks that are formed is then affixed to the previous state using a form of a compression function in order to compute the updated state. This entire process is usually referred as chaining of a variable. After the processing of the message is completed, the output is given as the last step of the process. The state

Tuesday, February 11, 2020

General Motors Research Paper Example | Topics and Well Written Essays - 500 words - 2

General Motors - Research Paper Example companies trailed voluntary petitions for assistance under Title 11 of the United States of Bankruptcy code as per Chapter 11 reorganization (United States Environmental Protection Agency, 2010). In this scenario GM, had filed a motion to gain approval by the Bankruptcy court, which led to the creation of NGMCO, Inc. However, after the purchase of â€Å"Old GM† by NGMCO, it was again renamed as General Motor Company. This evolution of new operations advocated in favor of the fact that the bankruptcy conversion was guided by the concept of â€Å"pre-packaged† Chapter 11 reorganization (Stoll & Terlep, 2009). GM’s filing for bankruptcy in 2009 indeed marked one of the darkest falls in the automobile history. Although the turn of events that led to GM’s bankruptcy had been predictive, critics were of the view that the sole reasons for the automobile giant’s fall was hidden in its managerial faults as well as sudden upsurge of the global economic downturn. As mentioned in The Economists (2009), â€Å"The collapse of General Motors into bankruptcy is only the latest chapter in a long story of mismanagement and decline†. According to the reports, there were various reasons behind the bankruptcy of GM. One of the major reasons of the bankruptcy was argued to be its mismanagement of finances and poor liquidity structure. Critics also argued that ineffective forecast of the external business environment affected the efficiency of the company in the global market, where its stagnancy in brand exposure also hampered its long run sustainability. In addition, the company also failed in taking requisite measures to file for bankruptcy, which affected its stakeholders’ interests to a substantial extent (Carty, 2009). Most effective course of action to solve the problem. As can be observed from the above context, the primary problem inherent to GM’s failure was related to its managerial deficiencies. In this regard, application of the cognitive theory could have been