Compare the attacking time of above three tasks

Assignment Help Computer Engineering
Reference no: EM133699555

Overview

The attacker can apply the bruteforce attack and intelligent search attack to guess your password. The one-way function (cryptographic hash function) takes the password and converts it to a fixed-size string (hash value). However, it is impossible to convert it back. Then the one-way function property can guarantee the security of your password in some applications. Each distinct password produces a distinct hash value. It means that even the similar data produces very different hashes. This allows you to be sure that the starting data are the same if two hashes are identical. The objective of this lab is for students to gain practical insights into the different attacks, security of one-way functions and learn how to use them.

There are many well-known cryptographic hash functions (e.g., MD5, SHA1, SHA2-256, SHA2-512) in cybersecurity and existing programming libraries to be used. This lab covers the following topics:

• Implementation of hashing your message with existing libraries

• Implementation of bruteforce attack

Lab environment. There is no specific requirement of the programming language. You can use any programming language (e.g., Java, C/C++, and Python). The example will be illustrated by Python
There are many hash functions defined in the "hashlib" library in python. This example deals
with explanation and working of MD5 hash. This hash function accepts sequence of bytes
(input can be any size) and returns 128 bit hash value (output is always 128 bits). Functions
associated :
• encode(): Converts the string into bytes to be acceptable by hash function.
• hexdigest(): Returns the encoded data in hexadecimal format.

Tasks
You will get familiar with the attacks for guessing passwords. Alice sets a password for her account. Now you should crack her password with different settings. Please write the programs to achieve the brute force attack and get Alice's password. You need to call the Check(string) function to check if your find the correct answer.

Task 1: The hash value of her password by MD5 is 94d9e03c11395841301a7aee967864ec. You know the password length is 14. (The password can be combined with A-Z, a-z, or 0-9):

Task2: The hash value of her password by MD5 is f593def02f37f3a6d57bcbc9480a3316. You know the specific password format: <4-UPPER CASE LETTER><3-DIGIT- NUMBER><4-SMALLER CASE LETTER> (e.g., XYEX234ascf).

Task3: The hash value of her password by MD5 is bfb2c12706757b8324368de6a365338b. You know the specific password format: the length is 11 and it includes 7 upper case letters and the number "1234". But you don't know the position of "1234".

Task4: Please compare the attacking time of above three tasks and discuss the difficulty level to attack them. (which one is easiest and which one is hardest and reason)

Reference no: EM133699555

Questions Cloud

Which guidelines should you use while treating htn : What can done to facilitate language barrier and cultural belief? Is patient at high risk? If high risk why? Which guidelines should you use while treating HTN?
Explain the safety precautions associated with certification : American Registry of Radiologic Technologists. Explain the safety precautions associated with the certification for the technologist and/or patient.
What does adina tell donnelly that the chart should include : proposed equipment and then to present it to her in a hardware configuration chart. What does Adina tell Donnelly that the chart should include
Difference between human rights and civil liberties : What is the difference between human rights and civil liberties? In what controversial ways do human rights intersect with Homeland Security and terrorism?
Compare the attacking time of above three tasks : Compare the attacking time of above three tasks and discuss the difficulty level to attack them. (which one is easiest and which one is hardest and reason)
Which phases of the nursing process is the nurse applying : The nurse also notices a specific area on client's right forearm that appears to be cut or scratched. Which phases of the nursing process is the nurse applying?
Outline the information that you would report to mother-baby : Outline the information that you would report to the mother-baby nurse when you transfer the new mother and her baby to her room on the postpartum unit.
Explain the tension between the media and the government : Explain the tension between the media and the government, police, and security forces. Provide an example.
Which nursing action is best : When administering this injection, which nursing action is best? Speak quietly and administer the injection while the child is groggy.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd