100 likes | 228 Views
Week Fourteen Agenda. Announcements Final exam test dates. December 11 through 18. Presentations Hash Function If there are problems associated with taking the final exam , call me at 614.519.5853 and be persistent . Week Fourteen .
E N D
Week Fourteen Agenda Announcements Final exam test dates. December 11 through 18. Presentations Hash Function If there are problems associated with taking the final exam, call me at 614.519.5853 and be persistent.
Week Fourteen AgendaWeek Fourteen December 9, 2013 Open Source presenter(s) are: Student name: Stacy Zimmerman Open source topic: Brain Workshop (14) • Student name: Cynthia Shoenleben • Open source topic: JASIG's uPortal (14) • Student name: Ryan Allison • Open source topic: GNS3 (14) Student name: Paul Burkholder Open source topic: Asterisk (14)
Week Fourteen Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are: • Student name: Paula Godley-Cooper • Open source topic: Funambol (14) • Student name: Anne Salmon • Open source topic: CamStudio (14) • Student name: Charles Hayes • Open source topic: Ubuntu (14) • Student name: Clarence Irby • Open source topic: Ganglia Monitoring System (14)
Week Fourteen Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are: Student name: Nathan Stockwell Open source topic: DD-WRT (14) • Student name: Kyle Mokma • Open source topic: Chromium OS (14) • Student name: Justin Barga • Open source topic: KeePass (14) • Student name: David Abrams • Open source topic: (14)
Week Fourteen • Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It is also used in many encryption algorithms.
Week Fourteen • In cryptography, encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, and only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.
Week Fourteen The MD5 message-digest algorithm is a widely used crytographic hash function producing a 128 bit (16 byte) hash value typically represented as a 32 digit hexadecimal number. MD5 is utilized in a variety of security applications. It is widely used to check data integrity.
Week Fourteen Agenda Questions and Issues Your final exam status will be displayed on the Announcement page as the completed exams are received.