Conduct an Internet search on two widely used GUI forensic tools, Guidance Software EnCase and AccessData FTK. Write a 1-page report comparing their features and indicate the functionalities you found most beneficial for the project. In your report, include a table outline of each tool’s capabilities. Integrity should be checked before installing any applications. Two different inputs cannot yield the same output for a hash function without collision. Calculate hash values using your name, for example “John X. Smith” and “John X Smith” (Note: there is no “.” after the middle initial for the second example.). If you don’t have a middle name, use “X” as your middle name. Compare the two hash values and include the findings in your report. (For calculating hash, you can use any tools that are available, such as http://www.fileformat.info/tool/hash.htm).
Grading criteria |
|
|
For the comparison of the hash values of the name “John X. Smith” and “John X Smith”, below is the attached screenshot of the hash value.
If we look at the length of the name “John X. Smith”, it has 13 bytes length including the spaces. Whereas, in “John X Smith” it has only 12 bytes including the spaces. So, there should be a huge difference in the hash values of both these names. All hash values such as MD2, MD4, MD5, SHA-1, SHA-512 will differ in both the names. The hash values can be same as it can be vulnerable to attacks. So, it is important that for each small changes the hash value must differ from other. This way the security can be maintained.
Get Answers For Free
Most questions answered within 1 hours.