Complete Case 11.1
The latest Blackberry mobile phone that includes hash features and functions enables or supports the secure hashing algorithm using the MD5 hash acceleration. It has the function that hashes message authentication code for providing more data security and integrity with FIPS 198 compliance.
The another example is spreading of the mail attachement viruses such as "I LOVE YOU" that comes in .VBS script files so how we can change the script in the way we execute. So by obtaining the certificate having private key and by deleting the signature from script we need to hash the script. Then after encrypt the hash with private key and sign it and later convert it into the script. If we need it to verify then extract all the hash from script and sign the certificate by the trusted root. Then after decrypt hash with public key and compare it with the received hash script.
References:
Windows Script Host: New Code-Signing Features Protect Against Malicious Scripts (n.d.) retrieved on 10/02/2010; retrieved from http://msdn.microsoft.com/en-us/magazine/cc302149.aspx
Certicom (n.d.). Certicom Suite B Hashing IP Hardware Core Features retrieved on 10/02/2010; retrieved from http://www.certicom.com/index.php/certicom-suite-b-hash-ip-core
C.Mark(2009)Uses for Hashes; retrieved on 10/02/2010; retrieved from Network Security Fundamentals
No comments:
Post a Comment