Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 2 The following questions examine the correct usage of the hash function for integrity protection. Please read them carefully and discuss your solutions.

image text in transcribedimage text in transcribedimage text in transcribed

Question 2 The following questions examine the correct usage of the hash function for integrity protection. Please read them carefully and discuss your solutions. (a) (b) You are given two payment screenshots as shown in files TMA01-21.JPG (MD5 hash: d0c1e6eb69349d738f35d36f662d245d) and TMA01-2ii.JPG (MD5 hash: 316ac0f633eae0df274af7f0e3efe5d9). Use a short Python code to calculate each file's SHA256 hash value. Discuss your findings and comment on the use of hash function for integrity protection in this case. (20 marks) Shirley compiles weekly income/expense reports for her family. She intends to use a hash function to integrity-protect the report's content and the date/time that each report was created. Use two (2) separate diagrams to illustrate how she could use a hash chain (similar to the chain of blocks in Bitcoin') and a binary Merkle Hash Tree (similar to the way Bitcoin transactions are arranged) to record the reports' hashes. In your diagrams, indicate the hash function and the information you will use to obtain the report's hash value. Compare the hash chain and the binary Merkle Hash Tree and choose the most suitable solution for Shirley's purpose. Explain your choice. (30 marks) (c) Suppose that your tutor-marked assignment is to be uploaded to a cloud drive (whose link is shared among your classmates) to your instructor. The cloud drive was incorrectly configured to allow anyone to add, remove, or edit files in it, and your instructor decided to leave the configuration as is because, having learned about the hash function, you should know better how to protect your own work. Explain how you would use a hash function to ensure that any (malicious) modifications of your assignment can be detected and how you can subsequently prove that the original report has been completed before the submission deadline. (10 marks) X Amount In SGD Transferred From DBS Multiplier Account To XXX2 YOU Technologies Group (SG) UEN 201628225CFAS Log Out 50.00 SHARE TRANSFER DETAILS SAVE RECIPIENT Amount In SGD Transferred From DBS Multiplier Account To XXX2 YOU Technologies Group (SG) UEN 201628225CFAS Log Out 50.00 SHARE TRANSFER DETAILS SAVE RECIPIENT

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managerial Accounting An Introduction to Concepts Methods and Uses

Authors: Michael W. Maher, Clyde P. Stickney, Roman L. Weil

10th Edition

1111822239, 324639767, 9781111822231, 978-0324639766

More Books

Students also viewed these Accounting questions

Question

Why are descriptive statistics so important?

Answered: 1 week ago