MD5 and SHA-1 Hash Functions Course Name Student’s Name Date Table of Contents TOC \o "1-3" \h \z \u How MD5 and SHA-1 functions work PAGEREF _Toc508719413 \h 2Image: Hash functions generated using SHA-1 and MD5 PAGEREF _Toc508719414 \h 3Uses of MD5 and SHA-1 hash functions PAGEREF _Toc508719415 \h 3References PAGEREF _Toc508719416 \h 3 MD5 and SHA-1 Hash Functions How MD5 and SHA-1 functions workSHA-1 stands for Secure Hash Algorithm which the user is visiting the correct locations and not spoofed websites. This algorithm is considered the successor of MD5 and therefore will also be used to detect corruption of files likely to occur during data transmission (Landman 2014). ReferencesGupta P. & Kumar S. (2014). A comparative analysis of SHA and MD5 algorithm. architecture 1 5. Landman N. (2016). Secure Hashing Algorithms | Brilliant Math & Science Wiki. Brilliant.org. Retrieved 13 March 2018 from https://brilliant.org/wiki/secure-hashing-algorithms/ [...]
I have already generated the hash values this assignment is asking for. They are included in the attachment below. Please be sure to copy and paste this diagram in the body of the paper where it fits, information wise. All you will need to do is discuss the outcome of the values and the purpose they serve per the instructions, which I have also included in a separate attachment. This assignment will need to be completed by tomorrow, 3/13/18 4:00 PM CST. Thanks!