Question: Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and

 Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that

Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and its hash value in the following format; append your block diagram your MS Word answer sheet. Sample answer: Statement: Hash value: (2 marks) (b ) Use python's pycryptodome package and its relevant class(es) to find out the hash function that is used in https://sandbox.eth.build/. (Hint: the output hash value is 256 bits long). To do this, you should choose three (3) different hash functions with 256 bits output (the correct hash function being one of the three). For each hash function, write a short Python code to compute the resulting hash value of the statement in Part (a) and compare the hash value to your answer in Part (a). Attach your codes in this MS Word answer sheet. Your codes should be properly formatted. (10 marks) (c) Explain why you can be certain of your answer in Part (b). (2 marks) (d) Discuss why hash can be used as a secure fingerprint for a piece of data. (6 marks) Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and its hash value in the following format; append your block diagram your MS Word answer sheet. Sample answer: Statement: Hash value: (2 marks) (b ) Use python's pycryptodome package and its relevant class(es) to find out the hash function that is used in https://sandbox.eth.build/. (Hint: the output hash value is 256 bits long). To do this, you should choose three (3) different hash functions with 256 bits output (the correct hash function being one of the three). For each hash function, write a short Python code to compute the resulting hash value of the statement in Part (a) and compare the hash value to your answer in Part (a). Attach your codes in this MS Word answer sheet. Your codes should be properly formatted. (10 marks) (c) Explain why you can be certain of your answer in Part (b). (2 marks) (d) Discuss why hash can be used as a secure fingerprint for a piece of data. (6 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Finance Questions!