How many columns should your time memory tradeoff table

Assignment Help Operating System
Reference no: EM132489365

Question 1. Consider Lamport's Scheme for authentication.Suppose the parameter n=100.

(a)A crash can potentially cause the server to be out of synchronization with the user. For example, suppose after a crash, the server is storing h50(k), but a user Alice has become out of synchronization with the server, so she may either send in an earlier value such as h53(k), or a later value such as h47(k) for authentication. The authentication would fail in both cases, if the server does not know Alice is out of synchronization. Fortunately, the Lamport's scheme would allow the server to detect an out-of-synchronization user in either case. Please describe in details: 1.) how the server could detect that Alice is out of synchronization, and 2.) Alice is in which of the two cases (that is, is she sending h51(k) or h47(k)?).

b)Suppose an attacker is passively sniffing all the traffic between Alice and the server. For those two cases (Alice is sending either h51(k) or h47(k)), the server should take very different actions to ensure security. What are those actions? And Why? Please explain

Question 2. Take the last four digits of ( 40104446) as the amount of storage available (e.g., if the number was 12345678 then the available storage would be 5678, that is, you could store at most five thousand six hundred and seventy eight password/hash values). Suppose every password can be 3 to 5 characters long, and each character can be either a lower or upper case English letter (A-Z) or number (0-9). How many columns should your Time Memory Tradeoff table. Please provide detailed explanation

Question 3. Consider thesimplified boot process shown in the picture.
(a) Suppose the hash function is collision freeand the BIOS can never be compromised. If we modify the AEGIS architecture such that level i+1 will compute and store the hash of level i+2after leveli has already computed and stored the hash of level i+1, how could an attacker modify the OS without being detected, and why?

2367_figure.jpg

b. Following 3(a), even if we use digital signatures instead of hash function (assuming the digital signature and private key are perfectly secure), the attackers could still modify the OS without being detected. Please explain why

Given the following Colored Petri Net, list all sequences of those events that will not be detected as attacks.

2249_figure1.jpg

Reference no: EM132489365

Questions Cloud

Derive the condition for the optimal rotation : Derive the condition for the optimal rotation when a forest also provides species habitat services.
Deworming intervention had positive externalities : If the school based deworming intervention had positive externalities, would regression analysis overestimate or underestimate the treatment impact of the progr
Determine how much will the preferred stockholders receive : Determine how much will the preferred stockholders receive. Assuming that $94000 will be distributed as a dividend in the current year
Calculate the point price elasticity of demand : Calculate the point price elasticity of demand at PS = $9000 (which should make QS = 101600). Does this elasticity (E) value indicate that Smooth Sailing
How many columns should your time memory tradeoff table : how could an attacker modify the OS without being detected, and why? How many columns should your Time Memory Tradeoff table.
Write down the formula for total revenue : Write down the formula for "total revenue". If price increases, what happens to quantity demanded? What happens to total revenue?
What is profit-maximizing markup : You are the owner of a Mom and Pop store that buys milk from a supplier at a cost of $1 per gallon. You estimate the elasticity of demand for milk sold
Determine and perform vertical analysis : Using these data from the comparative balance sheet of Ivanhoe Company, perform vertical analysis. (Round percentages to 1 decimal place, e.g. 12.5%.)
Profit-maximizing price to charge a texan : David is the owner-manager of a car wash in a small town in Texas, and his goal is to maximize profits. Based on David's experience, the elasticity of demand

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd