How can an opponent attack this system

Assignment Help Basic Computer Science
Reference no: EM131211949

Because of the known risks of the UNIX password system, the SunOS-4.0 documentation recommends that the password file be removed and replaced with a publicly readable file called /etc/publickey. An entry in the file for user A consists of a user's identifier IDA, the user's public key, PUa, and the corresponding private key PRa.This private key is encrypted using DES with a key derived from the user's login password Pa. When A logs in, the system decrypts E(Pa, PRa) to obtain PRa.

a. The system then verifies that Pa was correctly supplied. How?

b. How can an opponent attack this system?

Reference no: EM131211949

Questions Cloud

Write a narrative summary of describing what you experienced : Write a narrative summary of describing what you experienced. Then, explain how each of the three sociological  perspectives (structural-functionalism, symbolic interactionism, and social conflict) would analyze what you say.
Write an essay persuading the readers about censorship : Are there any instances the government should limit information from the public? Consider matters of security, or violent or sexual content. Write an essay persuading the readers about your point of view of censorship.
The implementation of mutexes within the ecos kernel : If a thread has locked a mutex and then attempts to lock the mutex again, typically as a result of some recursive call in a complicated call graph, then either an assertion failure will be reported or the thread will deadlock. Suggest a reason for..
Briefly describe the difference between dac and rbac : List and briefly describe the principal physical characteristics used for biometric identification.
How can an opponent attack this system : Because of the known risks of the UNIX password system, the SunOS-4.0 documentation recommends that the password file be removed and replaced with a publicly readable file called /etc/publickey
Describe the significance of the selected category : Describe the selected content and explain the significance of the selected category across all of the religions studied. Show in what ways the category is significant for each religion.
Tendency for it to move to its equilibrium level : If a price is not an equilibrium price, there is a tendency for it to move to its equilibrium level. Regardless of whether the price is to high or to low to begin with, the adjustment process will increase the quantity of the good purchased. 'Expl..
Use of the 95 printable ascii characters : How long will it take to test exhaustively all possible passwords on a UNIX system?
What is the expected time to discover the correct password : Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute price-output if firm-oligopolstic industry collude

If firms in an oligopolstic industry successfully collude and form a cartel, what price and output will result? Price lower than the competitive price and because there are only a few firms in the industry, less output than the competitive amount

  What is the size of cache memory

A two-way set associative cache memory uses blocks of four words. Formulate all pertinent information required to construct the cache memory? What is the size of cache memory?

  What is one method to enter the project start date

What is one method to enter the project start date. Not the start date of a task (that's a different question, below) not even of the first task but the start date of the entire project. Describe AND provide a screen shot of the steps.

  How companies are using firewalss

Hackers can be an enormous security risk to any WAN. There are different types of hackers with different intent. Some of them just want to simply try and gain access to the network for fun to see if they can

  Web servers containing customer portals

All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected ..

  The government should never use fiscal policy

The government should never use fiscal policy to combat business cycle fluctuations coming from changes in autonomous investment if it also wishes to keep longer term movements in the price level to a minimum. Is this claim true, false or uncertain?

  Disaster recovery and business continuity policies

Disaster Recovery and Business Continuity Policies

  A computing platform is a combination of a computing device

A computing platform is a combination of a computing device, such as a specific laptop computer or PC, and a particular operating system. New advances in computer hardware and software are changing the nature of available computing platforms.

  Why is it important to define project scope clearly

What estimating techniques should be used for a mission critical project such as this?

  Number of coexistent issues

This case takes a "horizontal" slice through a number of coexistent issues. As a result, the challenge is "knowing where to start" - just as it is in real organizations - and this requires detective work.

  Creation of a base geometric class

The lab will require the creation of a base geometric class, called Shape, and two sub classes, Circle and Rectangle, that are derived public from the class Shape.

  Definite versus indefinite loops

Definite versus Indefinite Loops

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd