Discussion: Crptography
Download and experiment with the WinMD5 or MD5 hash generator and get a feel of the hashing algorithms.
1. In what ways can a hash value be secured so as to provide message authentication?
2. Elaborate on the applications, weaknesses and limitations of the hashing algorithms.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.