Computer Network Security

Currently, it is not possible to generate a meaningful collision using the MD5 collision attack. For this reason, it is sometimes claimed that MD5 collisions are not a significant security threat. The goal of this problem is convince you otherwise. Obtain the file MD5_collision.zip from the textbook website and unzip the folder to obtain the two Postscript files, rec2.ps and auth2.ps.

a. What message is displayed when you view rec2 .ps in a Postscript viewer? What message is displayed when you view auth2.ps in a Postscript viewer?

Don't use plagiarized sources. Get Your Custom Essay on
Computer Network Security
Just from $13/Page
Order Essay

b. What is the MD5 hash of rec2.ps? What is the MD5 hash of auth2.ps? Why is this a security problem? Give a specific attack that Trudy can easily conduct in this particular case. Hint: Consider a digital signature.

c. Modify rec2. ps and auth2. ps so that they display different messages than they currently do, but they hash to the same value. What are the resulting hash values?

d. Since it is not possible to generate a meaningful MD5 collision, how is it possible for two (meaningful) messages to have the same

Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.