Expected time to find all users passwords

Assignment Help Computer Network Security
Reference no: EM1360690

Actually, I took this question from Matt Bishop's Introduction to Computer Security. The answer can be in any format but is preferred if it is short in points.

"The designers of the UNIX password algorithm used a 12-bit salt to perturb the first and third sets of 12 entries in the E-table of the UNIX hashing function (the DES). Consider a system with 224 users. Assume that each user is assigned a salt from a uniform random distribution and that anyone can read the password hashes and salts for the users.

What is the expected time to find all users' passwords using a dictionary attack?

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

Assume that the passwords were eight characters long but that the salt length was increased to 24 bits. Again, the salts (and the corresponding algorithms) are known to all users. What would be the expected time to find all users' passwords using a dictionary attack?"

Reference no: EM1360690

Decode the given message

Show that the formula B + C - A = X is a reasonable one for JPEG by forming linear approximations at A to the partial derivatives of luminance with respect to x and y coordi

Dubbing was coined as a term of copying

Dubbing was coined as a term of copying media in the 1980's for all mediums. What term was a major issue during the process of continously dubbing media? Digitization cured

Describe worst practices that avoided when selecting an epp

Name and briefly describe three "best practices" that should be used when acquiring (purchasing) an EPP. Name and briefly describe three "worst practices" that should be avoid

Monitoring of a secure network design in an organization

Analyze strategies for maintenance and monitoring of a secure network design in an organization. Create recommendations for maintenance and monitoring tools to support mainten

Protection of children against sexual exploitation act

What court struck down most of the Child Pornography Prevention Act, saying that it was unconstitutional to the extent that it proscribed computer images that did not involv

How many keys are there in this compound cipher

An affine cipher can be combined with a Vigenère cipher by fixing a but using k different values of b and cycling through these b values, letter by letter. How many keys are

Discuss how standards for encryption modules

Go to the NIST FIPS 140-2 standards Website and read about the 140-2 encryption standards along with its annexes, discuss how standards for encryption modules and algorithms

Describe policies standards processes and guidelines

Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations ha

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd