What is the corresponding key length in bits

Assignment Help Computer Engineering
Reference no: EM13704501

We now suppose the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password.

Question 1:  Assume a password consisting of 8 letters, where each letter is encoded by the ASCII scheme (7 bits per character, i.e., 128 possible characters).

What is the size of the key space which can be constructed by such passwords?

Question 2: What is the corresponding key length in bits?

Question 3: Assume that most users use only the 26 lowercase letters from the alphabet instead of the full 7 bits of the ASCII-encoding. What is the corresponding key length in bits in this case?

Question 4: At least how many characters are required for a password in order to generate a key length of 128 bits in case of letters consisting of

Part a: 7-bit characters?

Part b: 26 lowercase letters from the alphabet?

Can you show what the corresponding key length in bits is?

Verified Expert

If we assume a password consisting of 8 letters where each letter is encoded by the ASCII. It must contain at least one of the following such as Lower case letters, Upper case letters, Digits, Punctuation and Special characters. As we know that the general formula to calculate possible combination is n8

Reference no: EM13704501

Questions Cloud

Implement assembly language program to find greatest value : Write an assembly language program that will accept two 1-digit numbers (from 0 to 9) from the keyboard, compare the two numbers, and then print out the number of greatest value.
Evaluate the total average of all the inputs : Once the user enters in the desired amount of inputs, they will then select the second button "Calculate".
Create a short assembly program : You need to create a short assembly program named char_int, stored in file char_int.asm, that prompts the user for a character, and then for an integer.
Write a java program that creates 3 threads : Write a Java program that creates 3 threads each of them performing 10 reading/writing to the shared location. Use a random number generator to decide if the request is reading or writing
What is the corresponding key length in bits : What is the size of the key space which can be constructed by such passwords - What is the corresponding key length in bits?
Procedure just prints out the number 10 and returns : Your program will have three procedures. The main procedure (with the asm_main label), will sign on and them call a menu procedure that displays a two line menu:
Perform an attack against the cipher : Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?
Develop a set of six powerpoint : Develop a set of six PowerPoint or MS Word slides or six paragraphs to present the history, current level of usage, typical applications, future prospects and usability for the selected application.
Hazard detection : Repeat the same exercise for (a) and (b), but now use NOPs only when a hazard cannot be avoided by changing or rearranging these instructions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionwrite down python program that will read list of

questionwrite down python program that will read list of temperatures from a data file you created called tempfile.txt

  Performance clause in the license agreement

Explain why is it significant to have the performance clause within the license agreement?

  Object code for the subsequent program

Write down the object code for the subsequent program, assuming that it is not necessary to force extended addressing.

  Assume you were in charge of aircraft maintenance

What would be an case of each type of maintenance --corrective, adaptive, perfective, and preventive-- in this situation.

  Examine the present options available for use of tcpip and

write a 4-7 page paper including the following analyze the current options available for use of tcpip and osi models

  Express how database processing differs from file

What is e-Commerce? How may e-Commerce businesses be categorized? What are three major issues facing e-Commerce?

  Program the user types an item number and a quantity

I need a program for a mail-order company. The program uses a data-entry screen in which the user types an item number and a quantity. Write each record to a file. Save program as MailOrderWrite.java

  Writing into file utilizing fileinputstream

Write down an application utilizing the FileInputStream which opens a file which consists of the name of user's favourite book and then show it to the user.

  Design an application that declares three phonecalls

Design an application that declares three PhoneCalls. Set the length of one PhoneCall to 10 minutes, another to 11 minutes, and allow the third object to use the defaut value supplied by the constructor. Then, display each PhoneCall's value.

  Developing the circuitry for class project

If number is divisable by 4 or 5, number has to be a multiple of 2 in order to generate an output. If the number is devisable by 3, it has to be a multiple of 3 and 5 to generate an output.

  Describe what business continuity planning is who should

q1. explain what business continuity planning is who should create the plan and the role of it.q2. list and explain

  Program on wireless connection technology

Program on wireless connection technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd