The assignment involves exploring properties of hash functions, assessing potential database compromise, and understanding protocols.
The assignment involves exploring properties of hash functions, assessing potential database compromise, and understanding protocols. Part 1: Hash Functions Introduction This notebook will have you explore properties of hash functions. Instructions Open the Jupyter notebook, “M2_Hashing.ipynb Download M2_Hashing.ipynb” and follow these instructions to complete the assignment. Alice realized that someone had compromised her system and…