Question: Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and

Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and its hash value in the following format; append your block diagram your MS Word answer sheet. Sample answer: Statement: Hash value: (2 marks) (b ) Use python's pycryptodome package and its relevant class(es) to find out the hash function that is used in https://sandbox.eth.build/. (Hint: the output hash value is 256 bits long). To do this, you should choose three (3) different hash functions with 256 bits output (the correct hash function being one of the three). For each hash function, write a short Python code to compute the resulting hash value of the statement in Part (a) and compare the hash value to your answer in Part (a). Attach your codes in this MS Word answer sheet. Your codes should be properly formatted. (10 marks) (c) Explain why you can be certain of your answer in Part (b). (2 marks) (d) Discuss why hash can be used as a secure fingerprint for a piece of data. (6 marks) Question 1 (a) Go to https://sandbox.eth.build/. Create a block diagram that evaluates the hash value of a statement of your choice. Show your statement and its hash value in the following format; append your block diagram your MS Word answer sheet. Sample answer: Statement: Hash value: (2 marks) (b ) Use python's pycryptodome package and its relevant class(es) to find out the hash function that is used in https://sandbox.eth.build/. (Hint: the output hash value is 256 bits long). To do this, you should choose three (3) different hash functions with 256 bits output (the correct hash function being one of the three). For each hash function, write a short Python code to compute the resulting hash value of the statement in Part (a) and compare the hash value to your answer in Part (a). Attach your codes in this MS Word answer sheet. Your codes should be properly formatted. (10 marks) (c) Explain why you can be certain of your answer in Part (b). (2 marks) (d) Discuss why hash can be used as a secure fingerprint for a piece of data. (6 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
