Cipher password guess-cryptography, Computer Networking

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible?

b. Suppose a system requires passwords be 8 characters long, include at least one capital letter, at least one digit and at least one character from the set of 5 special characters { !,#,%,&,*} . What advantage does this provide an attacker who is trying to guess a password?



Posted Date: 2/28/2013 6:03:42 AM | Location : United States

Related Discussions:- Cipher password guess-cryptography, Assignment Help, Ask Question on Cipher password guess-cryptography, Get Answer, Expert's Help, Cipher password guess-cryptography Discussions

Write discussion on Cipher password guess-cryptography
Your posts are moderated
Related Questions
how tcp is redefined for wireless network

Microcells As cells become smaller, antennas move from the tops of tall buildings or hills, to the tops of small buildings or the sides of large buildings, and finally to lamp

WAN interface card(WIC) slots Two fixed WIC slots are present in  2600 series router except 2691. It has contained 3 WIC slots. Network Module Expansion Slot( NM) slot

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Q. What is Topology? - Physical/logical arrangement - Topology of a network is the geometric depiction of the relationship of all the links and linking devices to one anothe

Question: (a) With mobile telecommunications providing an important engine for growth, continuing to stimulate growth and to ensure mobiles remain affordable for all, will re

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

Q. What are the trends in Network Security ? Trends in Network Security Improved vigilance for virus infections Continual maturation of firewall technologies