0% found this document useful (0 votes)
51 views

NIS Part AB Rinku

This micro-project report summarizes a student's work on hashing functions under the guidance of their professor. The student studied hashing functions and collected information from various resources. They proposed and implemented a methodology to create a hash table with functions for insertion, removal, and searching of elements. This helped develop the student's programming skills and understanding of hashing functions, which are important for computer security applications such as data integrity, password strength, and password protection.

Uploaded by

Rina Sahare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

NIS Part AB Rinku

This micro-project report summarizes a student's work on hashing functions under the guidance of their professor. The student studied hashing functions and collected information from various resources. They proposed and implemented a methodology to create a hash table with functions for insertion, removal, and searching of elements. This helped develop the student's programming skills and understanding of hashing functions, which are important for computer security applications such as data integrity, password strength, and password protection.

Uploaded by

Rina Sahare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

PART – A

MICRO-PROJECT
ON
“ Hashing function”

Submitted :- 2022 – 23

This micro-project work submitted in partial fulfillment of requirement


for the award diploma in
COMPUTER TECHNOLOGY

Under the guidance of

Prof. K. U. Koche
(Lecture in Computer Department)

GOVERNMENT POLYTECHNIC BRAMHAPURI


GOVERNMENT POLYTECHNIC BRAMHAPURI
DIST. CHANDRAPUR
DEPARTMENT OF COMPUTER TECHNOLOGY

This is to certify that the following students of this Institute have carried
Out this micro-project work on “Hashing function” underthe guidance Of
Prof. K. U. Koche in the Diploma Engineering Duringthe session 2022-
2023. This work Has been done in the partial fulfillment Ofthe award for in
Computer Engineering from Maharashtra StateBoard of Technical
Education, Mumbai.

SUBMITTED BY

Name Roll No Enrollment No


1. Rinku N. Dadmal 56 2201210408

Project Guide Head of Department


Prof. K. U. Koche Prof. S. K. Kharkate
Part A : Micro-Project Proposal
“Hashing function”
1.0 Aim : Hashing function.

2.0 Course Outcomes Addressed


a. Identify ricks related to computer security and information hazard in
various situations.
b. Apply user identification and authentication methods.

3.0 Proposed Methodology


• Firstly we will study about given topic.
• Then after we will study and discuss about topic with our project guide.
• After we have collected the information of our topic from internet and
read some article.
• After we have started to working of micro project.
• After completing our micro-project firstly we will check .
• When our micro-project is ready then we submitted to our project guide.

4.0 Action Plan


Sr. Details of activity Planned Planned Name of
No Start Finish Responsible
. date date Team
Members
1. Discuss about the Rinku N.Dadmal
Topic
2. Information searchfrom Rinku N. Dadmal
various resources
3. Implement part A Rinku N. Dadmal

4. Collect information relation Rinku N. Dadmal


to the points decided earlier
5. Verify the Rinku N. Dadmal
collected
information
6. Final project report Rinku N. Dadmal

7. Submission Rinku N. Dadmal


5.0 Resources Required

Sr. Name of
No. Resource/material Specifications Qty Remarks
Windows 10 , i5 , 4GB As per
1. Desktop PC RAM , 1TB Required
hard-disk
Chrome & MS Word As per
2. Software Required
Part – B Micro-Project Report

1.0 Rationale :
Hashing is the practice of transforming a given key or string of characters into
another value for the purpose of security. Although the terms “hashing”and
“encryption” may be used interchangeably, hashing is always used used for the
purposed of one-way encryption, and hashed values are very difficult to decode.
Encryption always offers a decryption key, whereas hashed information cannot be
decoded easily and is meant to be used as a method for validating the integrity of an
object or piece of data.
These functions take input data and produce a fixed-size string of bytes, which is
used to verify the integrity of the data. It's like a digital fingerprint for the data,
making sure it hasn't been tampered with. Hashing functions are widely used in
various security protocols to protect sensitive information.

2.0 Aim :
Hashing function

3.0 Course Outcomes Addressed :

a. Identify ricks related to computer security and information hazard in


various situations.
b. Apply user identification and authentication methods

4.0 Literature Review :

We collect information about computer viruses and read Articles about


different types of viruses and take information about our Project. And we
knowing about which Pictures are used in our micro-project. We also collect
information about viruses from the famous book “Computer Security” which is
written by “Dieter Gollmann” From this
we understand computer security and different hashing
. We also visit the site the following sites to know more about micro
project.
1. https://www.geeksforgeeks.org/hash-functions-and-list-types-of-hash-
functions/
2. https://scholarhat.com/tutorial/datastructures/hashing-in-data-structures
3. https://www.geeksforgeeks.org/hash-functions-system-security/
4. https://www.tutorialspoint.com/cryptography/cryptography_hash_functions
5.0 Actual Proposed Methodology :
 Firstly we will study about given topic.
 Then after we will study and discuss about topic with our project guide.
 After we have collected the information of our topic from internet and
some article & reference books.
 After we have started to working of micro project.
 After completing our micro-project firstly we will check
 When our micro-project is ready then we submitted to our project guide.

6.0 Actual Resources Used :


Sr. No. Name of Specifications Qty
Resource/material
1. Desktop PC Windows 11 , i5 , As per Required
4GB RAM , 1TB
hard-disk
2. Software Chrome & MS Word As per Required
6.1 Coding:

#include <iostream>
#include <vector>
#include <list>

using namespace std;

class HashTable {
private:
vector<list<pair<int, string>>> table;
int size;

int hashFunction(int key) {


return key % size;
}
public:
HashTable(int tableSize) : size(tableSize) {
table.resize(size);
}
void insert(int key, const string& value) {
int index = hashFunction(key);
for (auto& pair : table[index]) {

if (pair.first == key) {
cout << "Key already exists." << endl;
return;
}
}
table[index].push_back(make_pair(key, value));
}

void remove(int key) {


int index = hashFunction(key);
for (auto it = table[index].begin(); it != table[index].end(); ++it) {
if (it->first == key) {
table[index].erase(it);
return;
}
}
cout << "Key not found." << endl;
}

string search(int key) {


int index = hashFunction(key);
for (auto& pair : table[index]) {
if (pair.first == key) {
return pair.second;
}
}
return "Key not found.";
}
};
int main() {
HashTable hashTable(10);

hashTable.insert(1, "Alice");
hashTable.insert(2, "Bob");
hashTable.insert(11, "Charlie");

cout << hashTable.search(1) << endl;


cout << hashTable.search(2) << endl;
cout << hashTable.search(11) << endl;

hashTable.remove(2);
cout << hashTable.search(2) << endl;

return 0;
}

 Output :
8.0 Skill Developed / Learning outcome of this Micro-Project :

 It makes us better at our job. Understanding programming helps cyber


security experts examine software and discover security vulnerabilities,
detect malicious codes, and execute tasks that involve analytical skills in
hashing function. The choice of which programming language to learn,
however, isn’t so simply put.

 The language to learn depends on our concentration, which could be in


computer forensics, security for web applications, information security,
malware analysis, or application security. Though the importance of any
given language varies by role, programming experience offers a higher
competitive edge for hashing function experts over others.

9.0 Applications of this Micro-Project :


1. This project can be used in the implementation of Data integrity.
2. The project can be also used to understand Password
strength generation.
3. The project can be used to protect password.

You might also like