How can an opponent attack this system

Assignment Help Basic Computer Science
Reference no: EM131211949

Because of the known risks of the UNIX password system, the SunOS-4.0 documentation recommends that the password file be removed and replaced with a publicly readable file called /etc/publickey. An entry in the file for user A consists of a user's identifier IDA, the user's public key, PUa, and the corresponding private key PRa.This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in, the system decrypts E(Pa, PRa) to obtain PRa.

a. The system then verifies that Pa was correctly supplied. How?

b. How can an opponent attack this system?

Reference no: EM131211949

Questions Cloud

Write a narrative summary of describing what you experienced : Write a narrative summary of describing what you experienced. Then, explain how each of the three sociological  perspectives (structural-functionalism, symbolic interactionism, and social conflict) would analyze what you say.
Write an essay persuading the readers about censorship : Are there any instances the government should limit information from the public? Consider matters of security, or violent or sexual content. Write an essay persuading the readers about your point of view of censorship.
The implementation of mutexes within the ecos kernel : If a thread has locked a mutex and then attempts to lock the mutex again, typically as a result of some recursive call in a complicated call graph, then either an assertion failure will be reported or the thread will deadlock. Suggest a reason for..
Briefly describe the difference between dac and rbac : List and briefly describe the principal physical characteristics used for biometric identification.
How can an opponent attack this system : Because of the known risks of the UNIX password system, the SunOS-4.0 documentation recommends that the password file be removed and replaced with a publicly readable file called /etc/publickey
Describe the significance of the selected category : Describe the selected content and explain the significance of the selected category across all of the religions studied. Show in what ways the category is significant for each religion.
Tendency for it to move to its equilibrium level : If a price is not an equilibrium price, there is a tendency for it to move to its equilibrium level. Regardless of whether the price is to high or to low to begin with, the adjustment process will increase the quantity of the good purchased. 'Expl..
Use of the 95 printable ascii characters : How long will it take to test exhaustively all possible passwords on a UNIX system?
What is the expected time to discover the correct password : Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Find the truth table that describes the following circuit

Find the truth table that describes the following circuit:

  Explains what an rfc is

Write a 500-word paper that explains what an RFC is, what an Internet Draft is, what organization produces these documents, and the process that is followed to produce these documents.

  Look through a newspaper and circulars for advertisement

Look through a newspaper and circulars for advertisement for training and education in security- and technology-related areas. What are the costs of the advertised security training? Network certification ? General computer training?

  Problem regarding the fiscal and monetary policy

Suppose the government imposes tax cuts for 95% of all households. How does this affect your firm? To what extent is your organization's financial health affected by fiscal and monetary policy? Please give at least one specific example.

  Schedule promotional activities

What tool/scan be used to document the overall promotional objectives; identify, plan and schedule promotional activities in action plans and ensure that time lines and costs for promotion of activities are realistic? What should be included in th..

  Multiplexing techniques of dsl and cable modem internet

From the e-Activity, analyze the multiplexing techniques of DSL and cable modem Internet and suggest the one you prefer. Explain your decision.

  Calculate the product of the two numbers

In general ask the user for 2 numbers, calculate the product of the two numbers (mul) and store product in memory. Then divide the 2 numbers entered and store the quotient and remainder in memory.

  Goals and objectives to perform an information systems audit

You have to provide a detail description in order for full credits.

  Create the equivalent of a four-function calculator

Create a three-function calculator for old-style English currency, where money amounts are specified in pounds, shillings, and pence.

  Who swallowed a cat, imagine that to swallow a cat.

There was an old woman who swallowed a fly. I don't know why she swallowed that fly, Perhaps she'll die. There was an old woman who swallowed a spider, That wriggled and wiggled and jiggled inside he She swallowed the spider to catch the fly, I do..

  What was originally called the imitation game by its creator

What is the term used for describing the judgmental or commonsense part of problem solving? What stage of the manufacturing process has been described as "the mapping of function onto form"?  What was originally called the "imitation game" by its cre..

  Ways in which time-dependent signals can be classified

•Discuss some ways in which time-dependent signals can be classified. •Discuss what is meant by "basic signal representation" and the advantage of this type of representation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd