1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
8

Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack

the accounts of two users, Alice and Bob. Eve performs an online attack, and is able to guess 1 password per second, though there is no lockout after guessing too many times. In the worst case, in seconds, how long will it take Eve to crack both Alice's and Bob's accounts
Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
8 0

Answer:

5 hr. 33 min. 20 sec.

Explanation:

Let P₁ be the number of possible passwords Alice can choose

Let P₂ be the number of possible passwords Bob can choose

In a 4 digit password, since the passwords are made up of 10 digits from 0 to 9, therefore the user can choose:

P₁ = 10⁴ = 10000

P₂ = 10⁴ = 10000

The total number of possible passwords combinations that both Alice and Bob can choose is therefore P₁ + P₂ = 10000 + 10000 = 20000.

If Eve performs an online attack and is able to guess 1 password per second.

Eve is therefore able to crack both Alice's and Bob's accounts in:

1 × 20000 = 20000 seconds

Converting 20000 seconds to hours, minutes and seconds will give 5 hr. 33 min. 20 sec.

Eve is able to crack both Alice's and Bob's accounts in 5 hr. 33 min. 20 sec.

Alenkasestr [34]3 years ago
6 0

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

You might be interested in
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
4 years ago
Join my among us <br><br> code GNLMJF
ryzh [129]

Answer:

i cant

Explanation:

i would but im on a chromebook rn

sorry but thanks

take care

8 0
3 years ago
Read 2 more answers
Who invented the first mechanical computer? in what year was it invented?.
Elodia [21]

Answer:

The first mechanical computer was invented by Charles Babbage in 1822.

6 0
2 years ago
So if i was a you tuber and i went to a very popular site and posted my channel link but i am not a very big you tuber what woul
luda_lava [24]

Answer:

10%-30%

Explanation:

depends on what site and how the site works

5 0
3 years ago
Required by the Fair and Accurate Credit Transaction Act of 2003 (FACTA), which of the following is an anti-identity theft rule
oksian1 [2.3K]

Answer:

Red Flags Rule

Explanation:

The Red Flags Law relies upon commercial banks and investors to put red flags in order to identify and deter identity fraud. Institutions must have a documented policy for the protection of fraud to control the organization and secure their clients.

Other options are incorrect because they are not related to the FACTA that is anti-identity theft rule.

3 0
3 years ago
Other questions:
  • As you move the click and type pointer around the document, the icon changes to represent ____________________ that will be appl
    10·2 answers
  • When are the malls going to open
    5·2 answers
  • Your company has an external database of payment information that they wish to populate in Salesforce. They have decided to use
    13·1 answer
  • Hurry asap it’s times
    8·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the array's
    5·1 answer
  • A domain name is used to: *
    15·1 answer
  • A web page that allows interaction from the user​
    12·1 answer
  • Difference between hardcopy and hardware​
    6·1 answer
  • What is a variable in programming?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!