1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
8

Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack

the accounts of two users, Alice and Bob. Eve performs an online attack, and is able to guess 1 password per second, though there is no lockout after guessing too many times. In the worst case, in seconds, how long will it take Eve to crack both Alice's and Bob's accounts
Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
8 0

Answer:

5 hr. 33 min. 20 sec.

Explanation:

Let P₁ be the number of possible passwords Alice can choose

Let P₂ be the number of possible passwords Bob can choose

In a 4 digit password, since the passwords are made up of 10 digits from 0 to 9, therefore the user can choose:

P₁ = 10⁴ = 10000

P₂ = 10⁴ = 10000

The total number of possible passwords combinations that both Alice and Bob can choose is therefore P₁ + P₂ = 10000 + 10000 = 20000.

If Eve performs an online attack and is able to guess 1 password per second.

Eve is therefore able to crack both Alice's and Bob's accounts in:

1 × 20000 = 20000 seconds

Converting 20000 seconds to hours, minutes and seconds will give 5 hr. 33 min. 20 sec.

Eve is able to crack both Alice's and Bob's accounts in 5 hr. 33 min. 20 sec.

Alenkasestr [34]3 years ago
6 0

Answer:

18000 seconds or 300 minutes.

Explanation:

In the example given in the question, it is stated that the system uses 32-bit unique salt which is equal to 4 bytes where every digit takes up 1 byte thus forming the 4 digit passwords.

Considering that the passwords are 4 digits, starting from 1000 and up to 9999, there are 9000 possible password combinations.

If Eve has to go through the whole range of possible password combinations and it takes her 1 second to guess 1 password. Then in the worst case scenario, it would take her 18000 seconds or 300 minutes to crack both accounts, assuming that it is possible for them to use the same passwords.

I hope this answer helps.

You might be interested in
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
Fynjy0 [20]

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

6 0
3 years ago
Which symbol should you use for entering a formula in a cell?
Sonbull [250]

A symbol which should be used for entering a formula in a cell is: B. =.

<h3>What is Microsoft Excel?</h3>

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.

<h3>What is a spreadsheet?</h3>

In Computer technology, a spreadsheet can be defined as a document which comprises cells that are arranged in a tabulated format with rows and columns. Also, a spreadsheet is typically used in various field to do the following on a data:

  • Sort
  • Calculate
  • Format
  • Arrange

As a general rule, "B. =" is a symbol which should be used for entering a formula in a cell on a spreadsheet application such as Microsoft Excel.

Read more on spreadsheets here: brainly.com/question/4965119

#SPJ1

3 0
2 years ago
What is the default delay before scripts are executed?
kenny6666 [7]
Answer is 5 minutes

The default value for windows 8.1 joined to a server 2003 domain logon scripts delays is not configured. However, the windows 8.1 may have a delay processing logon scripts of 5 minutes. The script does not execute until 5 minutes are over. Users have a Group policy applied to them that is used to assign a logon script.


8 0
3 years ago
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
3 years ago
Read 2 more answers
Consider a hard disk with the following specifications :<br> 3.5 in diameter
AnnyKZ [126]

Answer:

usable capacity = 10 GB

Number of cylinders = 256

Block size = 4 KB

(1)Bytes in each cylinder = (10*230)/(256) = (10*222) = 40 MegaBytes

(2)Number of Blocks in each cylinder = (10*222)/(212) = 10K

(3)capacity of one track = 40 MegaBytes/(10*2) = 2 MB

Rotation speed = 3840 RPM

Number of rotations per second = 3840/60 = 64

Transfer rate = (2*64) = 128 MB/sec

Explanation:

6 0
3 years ago
Other questions:
  • What is a browser cookie?
    10·2 answers
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • You open the home page for www.alpineskihouse. On the home page, you see a link for the weather report. You want to view the wea
    6·1 answer
  • If none of the contacts of a manual switch change status when the operator is activated, what is the most probable cause?
    9·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • A commercial depicts a teenager on a skateboard vandalizing a brick wall. This is an example of:
    11·2 answers
  • . Write a swift programming code to perform following tasks a) Declare a variable that stores the age of a person b) Declare a c
    5·1 answer
  • What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative enti
    5·1 answer
  • Jimmy has been issued a citation for littering in a city park. When Jimmy
    8·1 answer
  • What is microsoft excel​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!