1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
8

Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack

the accounts of two users, Alice and Bob. Eve performs an online attack, and is able to guess 1 password per second, though there is no lockout after guessing too many times. In the worst case, in seconds, how long will it take Eve to crack both Alice's and Bob's accounts
Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
8 0

Answer:

5 hr. 33 min. 20 sec.

Explanation:

Let P₁ be the number of possible passwords Alice can choose

Let P₂ be the number of possible passwords Bob can choose

In a 4 digit password, since the passwords are made up of 10 digits from 0 to 9, therefore the user can choose:

P₁ = 10⁴ = 10000

P₂ = 10⁴ = 10000

The total number of possible passwords combinations that both Alice and Bob can choose is therefore P₁ + P₂ = 10000 + 10000 = 20000.

If Eve performs an online attack and is able to guess 1 password per second.

Eve is therefore able to crack both Alice's and Bob's accounts in:

1 × 20000 = 20000 seconds

Converting 20000 seconds to hours, minutes and seconds will give 5 hr. 33 min. 20 sec.

Eve is able to crack both Alice's and Bob's accounts in 5 hr. 33 min. 20 sec.

Alenkasestr [34]3 years ago
6 0

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

You might be interested in
David is working in a database that organizes student exam grade information. He needs to find all students who have scored 100
kobusy [5.1K]

Answer:

David can apply filter to the data in order to show only records that meet the criteria.

Explanation:

  • Filter is a very helpful option that displays the records that you want to view, hiding rest of the unwanted records.
  • Sometimes you want to extract and view only the records that match a specific criteria instead of viewing all the records.
  • For example in the CUSTOMERS table which contains names, addresses, countries of customers. There are several customers from different countries but you only want to view the customers from Spain. So you can use filter feature to view all the customers from country Spain.
  • In MS Access you can apply filters using Sort & Filter group in the Home tab by selecting the desired column. In SQL, WHERE clause can be used along with SELECT to for filtering and extracting certain records. SELECT will select the records from the table and WHERE clause will specify the criteria to select the certain records.
7 0
3 years ago
___________is used for drawing 3D objects in the field of Science and Engineering.
Westkost [7]

Answer:

the answer is C mri hope this helps

Explanation:

6 0
2 years ago
Read 2 more answers
Call your function from Example 1 three times with different kinds of arguments: a value, a variable, and an expression. Identif
Blizzard [7]

Answer:

Example 1:

def function(num):  

   print(num*2)

Example 2:

function(5)

num = 2

function(num)

function(3-1)

Explanation:

Given:

See attachment for complete question

To start with Example (1)

def function(num):  

   print(num*2)

<em>Note that; the above code segment which doubles the parameter, num could have been any other code</em>

<em />

<em>In Example (1), the parameter is num</em>

For example (2):

We can call the function using:

#1. A value:

function(5)

<em>In #1, the argument is 5; a value</em>

#2. A Variable

num = 2

function(num)

<em>In #2, the argument is num; a variable</em>

#3. An Expression

function(3-1)

<em>In #3, the argument is 3-1; an expression</em>

8 0
3 years ago
Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
igomit [66]
She can use a flashdrive to store it, or she can go to her documents folder and store it. When she gets on the computer later, she can then continue working on the project.
3 0
3 years ago
A manager in your company wants to standardize all mobile device applications across different operating systems. Some users hav
MrRissso [65]

Answer:

The correct answer is letter "D": Some apps will work on different OS platforms, but many will not.

Explanation:

Devices using <em>Android, iOS, </em>and <em>Windows Mobile</em> Operating Systems (OS) use dedicated apps for each OS. OS providers reserve some of their key apps to the exclusive use of their devices which makes them different one from another and creates users having a bias on certain OS.  

Thus, <em>if the manager of a company is looking for standardizing all mobile applications across different OS, that is unlikely to be possible since some apps are compatible while others are not. </em>

7 0
3 years ago
Other questions:
  • How many panes can Pablo view in a spreadsheet if he chooses the split worksheet option?
    8·2 answers
  • List of programming languages and their typing
    5·2 answers
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • The postorder and preorder traversal of a binary tree are given below - postorder : D E B F G C A preorder : A B D E C F G respe
    6·1 answer
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • Paul is a chemical engineer working with large storage tanks of chemicals. Working from home using a program on his computer, he
    5·1 answer
  • [30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
    9·1 answer
  • Write a program that will predict the size of a population of organisms. The program should ask the user for the starting number
    8·1 answer
  • Cómo fue posible que los alemanes exterminando seres humanos​
    11·1 answer
  • What are the different Stape of data processing cycle?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!