(1) Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use.
(2) Crack the following three MD5 hash values and publish the plaintext in your lab document
- MD5 hash 1: 4eefef62c45d66f55d89c515d8352c5c
- MD5 hash 2: 5f4dcc3b5aa765d61d8327deb882cf99
- MD5 hash 3: d6a6bc0db10694a2d90e3a69648f3a03
(3) Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use.
Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct.