Professional Documents
Culture Documents
Objective and Overview Marks: Out of 5% Submission Rules: Word or PDF Format
Objective and Overview Marks: Out of 5% Submission Rules: Word or PDF Format
Submission Rules
▪ Submit in Word or PDF format on blackboard.
▪ Attach screenshots of the output for all the questions.
▪ Include the front page with All the details (Course description, Student id, name etc.)
▪ Due on 25th November, 2021 – late submissions will be penalized (0.25 Mark for each
day).
▪ This lab is individual work.
▪ Dr Moatsum Alawida
In this lab, we have two sections to learn on the hash functions. In the first section we are
working on crypto tool, that has large of algorithms and another tool of cryptanalysis. In
the second section, we have code MD5 in MATLAB, to study it carefully.
Part A: CryptoTool
CrypTool 2 (CT2) is a modern e-learning program for Windows, which visualizes
cryptography and cryptanalysis. It includes not only the encryption and cryptanalysis of
ciphers, but also their basics and the whole spectrum of modern cryptography.
4- Select hash function and select MD5 and Play and write the hash value below. Change an
one bit and also write the hash value.
5- Write your Student Id and find the hash value and keep a screenshot below.
6- In MD5 collision, click on Play on the home bar and write the input and output below.
7- In MD5 collision, change an one of the inputs by inserting one number and find the result
and keep a screenshot below.
8- In MD5 collision, change one of the inputs by inserting two numbers and find the new
output and keep a screenshot below.
9- In SHA-1 collision, click on Play on the home bar and write the input and output below.
10- In SHA-1 collision, change an one of the inputs by inserting one number and find the
new output and keep a screenshot below.
11- In SHA-1 collision, change one of the inputs by inserting two numbers and find the new
output and keep a screenshot below.
12- In DES-Known-Plaintext Analysis. Explain what the analysis is based on the cryptoToll's
instructions.
13- Create a new workspace with the graphical editor in the Main function. The leftmost
components bar has a large number of algorithms and tools. Then choose XOR from the
list of classical ciphers. Drag it to Workspace by clicking on it. Then go to Tools and look
for Text Input and Text Output. Add two Text Inputs, fill in any values, then connect them
all together with a Xor box. Then press the Play button. Try looking at the images.
14-Similarly, we can design algorithms with a variety of inputs and outputs. Make a similar
design with your name as seen in the figure below.
15-Design new algorithms while taking into account the number of input and output files that will
be used.
Keccak
AES
Blowfish
End lab.