MD5 Hash Collision Attacks
Description: The lab report discusses the vulnerabilities of the MD5 hashing algorithm, specifically its susceptibility to collision attacks. The lab involves generating MD5 hash collisions and explores how malicious code could use the same hash as benign code to bypass verification mechanisms.
Uses: MD5 hashing algorithm, md5collgen function for generating collisions, Python, C, Unix commands
Download