Video Description

MD5, SHA, and AES For this lesson we look at and discuss three algorithm encryption methods and standards: message digest algorithm (MD5), secure hashing algorithm (SHA) and the advanced encryption standard (AES). You'll learn what functions MD5 and SHA achieve, how the integrity of the network can be compromised, what vulnerabilities these encryption methods have, what's met by collision resistant, and which encryption method is the most effective countermeasures that can currently be used as an access control strategy. [toggle_content title="Transcript"] The next item we look at is the MD5, otherwise known as Message Digest Algorithm 5. This is a widely used hashing function that produces a 128 bit hash expressed as a 32 character hexadecimal product. It is commonly used to check the validity of critical system files. It also is used to obscure our passwords. When we are typing in our passwords on the system and you know somebody might be stood next to you, you need them seeing your password. So it obscures our password. Any entry we want to obscure, it is achieved with MD5. It also helps to verify downloaded content. Some organizations, when they advertise their software online, they would also calculate the hash value with MD5. The hash value is advertised next to the download. When a user downloads the software, you can use, you can run it in software that functions with MD5 to get the hash value. If the hash value of the downloaded software is the same as the advertised hash value on the server, you would know to trust the download. Sometimes malicious persons could upload their malicious payload onto these sites. So we want to test that the hash value we get for the download is exactly what it is as advertised on the web servers. However, for MD5 it has been profoundly demonstrated that it is not collision resistant to a number of attacks. What do we mean not collision resistant? When you have a random set of data, you create the hash value. A different set of data is able to create the same hash value. Malicious persons are able to force the value that has been changed to still give the original hash value, thereby deceiving end users or deceiving administrators into trusting information that has been corrupt. So MD5 has been known to be vulnerable to such attacks, hence we say it is not collision resistant. The next Algorithm here is the Secure Hashing Algorithm, which we call as SHA-is a checksum Algorithm capable of producing a fixed and variable digest sizes up to 512 bits. We have SHA1, SHA2, SHA3 and these are SHA 0, 1 and 2. We have SHA 0, SHA 1, SHA 2. These are different variants of this hashing Algorithm. Stronger hashing Algorithms equate to longer hash values and they may take more time to generate or to secure solutions and this increases the overall overhead when trying to reverse the hash value. Advance Encryption standard -this is one of the best encryption standards in the world. The Hashing Algorithms because --this solution works very fast either in software or hardware implementations, and it requires very little memory for operation. As a result it is preferred by many environments. It is also an Algorithm that has gone through a 5-year rigorous testing process where many other brands have been tested for fitness and AES was found to be the best it is one of the most popular in use today. It operates very fast either in hardware or software implementations and requires very little memory for usage. [/toggle_content]

Course Modules

CompTIA Security+

Instructor Background

Instructed By

Instructor Profile Image

CISSP CISM CISA CHFI CSXF CEH, Cyber Security Specialist & Trainer



Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support