Part 1: Hash Functions
Introduction
This notebook will have you explore properties of hash functions.
Instructions
Open the Jupyter notebook, “M2_Hashing.ipynb Download M2_Hashing.ipynb” and follow these instructions to complete the assignment. Alice realized that someone had compromised her system and may have gained access.
Part 2: Hackers!
Introduction
Alice realized that someone had compromised her system and may have gained access
to her database and the table with customers’ passwords. The database was set up long ago, so she doesn’t know that much about it. You’ve been asked to look at that table and assess what you can about it.
Instructions
Open the Jupyter notebook, “M2_Hackersashing.ipynb Download M2_Hackersashing.ipynb” and follow these instructions to complete the assignment.
Part 3: Protocols
Instructions
Open the Jupyter notebook, “M2_Protocols.ipynb Download M2_Protocols.ipynb” and follow the instructions to complete the assignment.
Format
When you are done, you can use the file menu to print your notebook to a PDF.
Only one member of your group needs to submit the deliverable for this assignment.
To understand how your work will be assessed, view the scoring rubric below.
In addition, provide a document explaining the solution and how it solved
Leave a Reply
You must be logged in to post a comment.