You are expected to write a well-researched paper highlighting the key issues you have been tasked to find out. Include references in your research. Plagiarism will be heavily penalized.
Analyze hashing and message digests
Analyze Cryptographic Weaknesses:Encryption based attacks (birthday, dictionary, replay, side channel, factoring attacks), Cryptanalysis methodologies, Frequency analysis, Reverse Engineering, Temporary Files’ vulnerabilities.