Hashing algorithms

 

 

1.
Hashing algorithms have been around a long time. For example, MD5 has been used for authentication of numerous websites. In recent years however, between the increase in CPU performance and weak keys, MD5 no longer provides adequate protection. Research newer Hashing algorithms that can replace MD5. Select 3 and do a pro-con comparison of them. Which would you recommend? Why? How would you deploy this new algorithm in your organization’s website?

2.
HTTPS is increasing in popularity and is rapidly replacing HTTP as a security protocol for web traffic. What are the advantages of HTTPS? How would you deploy it on your organization’s website? Are there any disadvantages? Would HTTPS protect you when using a public WiFi connection? Why or why not?

 

This question has been answered.

Get Answer