What will be the minimal length of the key

Assignment Help Computer Network Security
Reference no: EM13329020

Encrypt-It-Rite, a vendor of encryption software, sells a symmetric cipher that uses a 56-bit key. The company decides to conduct a "challenge" to crack an encrypted message using a brute-force approach. The average time to crack the message is found to be 1 hrs. As a result, Encrypt-It-Rite decides to increase the key length by 8 bits, from 64 to 72 bits. They then conduct another challenge. What average cracking time would be expected for the new, improved cipher? If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?

Reference no: EM13329020

Questions Cloud

Explain conditional formation constant for ca(edta)2 : Find the conditional formation constant for Ca(EDTA)2- at pH 9.00, where log Kf is 10.65 and ?Y4- is 0.041.
Determine the centripetal acceleration of the car : A car with a mass of 1234 kg is travelling around a circular track with a radius of 100.m and a tangential velocity of 23 m/s. Determine the centripetal acceleration of the car
While the total revenue of that good increases by 15 percent : A price change causes the quantity demanded of a good to decrease by 30 percent , while the total revenue of that good increases by 15 percent. Is the demand curve elastic or inelastic ? Explain?
Determine what is the stocks growth rate per share : A firm's recent dividend was $2.00 per share. The stock is selling in the market place for $50.00 per share. If investors are demanding 10% on this stock, what is this stock's growth rate
What will be the minimal length of the key : If Encrypt-It-Rite would like to increase the average cracking time to at least 100 years, what will be the minimal length of the key?
What equal annual deposits must be made at : What equal annual deposits must be made at t=2,3,4,5,8,9 and in 10 in order to accumulate $40,000 at t=15 if money is worth 10% compounded annually?
What is the purpose of the diffie-hellman algorithm : Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.
Explain a buffer solution contains 0.71 mol of boric acid : A buffer solution contains 0.71 mol of boric acid (H3BO3) and 0.53 mol of sodium dihydrogen borate (NaH2BO3) in 4.00 L. The Ka of boric acid (H3BO3) is Ka = 5.8e-10. What is the pH of the buffer after the addition of 0.50 mol of NaOH
What amount should be paid for the bond : Mr.Fritz wishes to purchase a bond having a face value of $1000 and a bond rate of 8% payable annually. The bond has a remaining life of 12 years. In order to earn 10% rate of return on the investment, what amount should be paid for the bond?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Most threatening security issues firms have to deal with

Research current security trends, countermeasures, and threats. What will be the most threatening security issues firms have to deal with within the next five years?

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  Information security breaches

What special consequences do you foresee from information security breaches confined to online retail banking compared to online commercial banking?

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd