Cipher password guess-cryptography, Computer Networking

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible?

b. Suppose a system requires passwords be 8 characters long, include at least one capital letter, at least one digit and at least one character from the set of 5 special characters { !,#,%,&,*} . What advantage does this provide an attacker who is trying to guess a password?

 

 

Posted Date: 2/28/2013 6:03:42 AM | Location : United States







Related Discussions:- Cipher password guess-cryptography, Assignment Help, Ask Question on Cipher password guess-cryptography, Get Answer, Expert's Help, Cipher password guess-cryptography Discussions

Write discussion on Cipher password guess-cryptography
Your posts are moderated
Related Questions
What is silly window syndrome? It is a difficulty that can ruin TCP performance. This problem happens when data are passed to the sending TCP entity in large blocks, but an int

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Q. Show the Network Layer Responsibilities? - Source-to-destination delivery it is possibly across multiple networks - Logical addressing - Routing

"arpa" is used by the Cisco IOS for which encapsulation types Ans) Ethernet_II

Determine the functioning of Service Support Service Support must be considered a strong point for hardware, especially for servers and should be available readily. Many brande

What are instance variables? Instance variables are those which are explained at the class level. Instance variables require not be initialized before using them as they are au

100Base-TX Uses two category 5 UTP cable pairs or else two STP cable pairs to connect stations to a hub (star) One pair holds frames from station to hub one pair from

Determine the term - Mobility Mobility refers to the types of physical transitions that can be done by a mobile node within an 802.11 environment (no transition, movement from

CAM- Content Address Memory.  Its another name of MAC address table.

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi