Announcements
Final exam test dates. December 11 through 18.
Presentations
Hash Function
If there are problems associated with taking the final exam, call me at 614.519.5853
and be persistent.
WEEK FOURTEEN AGENDA
AgendaWeek Fourteen December 9, 2013 Open Source presenter(s) are:
Student name: Stacy Zimmerman
Open source topic: Brain Workshop (14)
Student name: Cynthia Shoenleben
Open source topic: JASIG's uPortal (14)
Student name: Ryan Allison
Open source topic: GNS3 (14)
Student name: Paul Burkholder
Open source topic: Asterisk (14)
WEEK FOURTEEN
Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are:
Student name: Paula Godley-Cooper
Open source topic: Funambol (14)
Student name: Anne Salmon
Open source topic: CamStudio (14)
Student name: Charles Hayes
Open source topic: Ubuntu (14)
Student name: Clarence Irby
Open source topic: Ganglia Monitoring System (14)
WEEK FOURTEEN
Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are:
Student name: Nathan Stockwell
Open source topic: DD-WRT (14)
Student name: Kyle Mokma
Open source topic: Chromium OS (14)
Student name: Justin Barga
Open source topic: KeePass (14)
Student name: David Abrams
Open source topic: (14)
WEEK FOURTEEN
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is
used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It
is also used in many encryption algorithms.
WEEK FOURTEEN
WEEK FOURTEEN
In cryptography, encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, and only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. In an
encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it
into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be
able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key,
that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to
randomly produce keys.
WEEK FOURTEEN
The MD5 message-digest algorithm is a widely used crytographic hash function producing a 128 bit (16 byte) hash value typically represented as a 32 digit hexadecimal number.
MD5 is utilized in a variety of security applications. It is widely used to check data integrity.
WEEK FOURTEEN
Questions and Issues
Your final exam status will be displayed on the Announcement page as the completed exams are
received.
WEEK FOURTEEN AGENDA