The relation between passwords and key size

Assignment Help Computer Network Security
Reference no: EM13168517

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password.

1. Assume a password consisting of 8 letters, where each letter is encoded by the

ASCII scheme (7 bits per character, i.e., 128 possible characters). What is the

size of the key space which can be constructed by such passwords?

2. What is the corresponding key length in bits?

3. Assume that most users use only the 26 lowercase letters from the alphabet instead of the full 7 bits of the ASCII-encoding. What is the corresponding key

length in bits in this case?

4. At least how many characters are required for a password in order to generate a key length of 128 bits in case of letters consisting of

a. 7-bit characters?

b. 26 lowercase letters from the alphabet?

Reference no: EM13168517

Questions Cloud

What would be the total revenue at the breakeven point : What are the expected benefits of the implementation of an effective system of internal controls for an organization and what would be the total revenue at the breakeven point?
Explain what mass of co2 and h20 would be produced during : What mass of CO2 and H20 would be produced during the combustion analysis of 0.1674 g of the cobalamin?
The program calls a function called getgrades : The program calls a function called GetGrades that will read in grades from the keyboard, the number of grades should also be input by the user.
Write a program that calculates net pay : Write a program that calculates Net Pay. It should do this by calling a function called CalNetPay that calculates and returns Net Pay when given the hours worked and the hourly pay rate. The main function should pass the hours worked and pay rate ..
The relation between passwords and key size : the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password
Write a program that will call a function : Write a program that will call a function called writeDataToFile to prompt a user for their first name, last name and zip code, and print this information to a file called "UserData.txt". The main function should prompt the user for the same infor..
The main function should prompt the user : The main function should prompt the user for the 2 numbers, call the function to display the correct label, then calculate and display the sum of the numbers. Call the function to display the correct label, then calculate and display the differenc..
What are bufferedinput/outputstreams : What are BufferedInput/OutputStreams and why are they used? Write some Java code to illustrate how to create a BufferedInputStream.
Prepare a pension worksheet for the pension plan : Prepare a pension worksheet for the pension plan in 2012 and prepare any journal entries related to the pension plan that would be needed at December 31, 2012.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  Future threats to network security - research paper

Deliver a research paper and presentation based on your research - Future threats to network security and planning for those threats

  Coaxial cable as a transmission medium

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair wiring emerged as a better and faster medium.

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd