How many columns should your time memory tradeoff table

Assignment Help Operating System
Reference no: EM132489365

Question 1. Consider Lamport's Scheme for authentication.Suppose the parameter n=100.

(a)A crash can potentially cause the server to be out of synchronization with the user. For example, suppose after a crash, the server is storing h50(k), but a user Alice has become out of synchronization with the server, so she may either send in an earlier value such as h53(k), or a later value such as h47(k) for authentication. The authentication would fail in both cases, if the server does not know Alice is out of synchronization. Fortunately, the Lamport's scheme would allow the server to detect an out-of-synchronization user in either case. Please describe in details: 1.) how the server could detect that Alice is out of synchronization, and 2.) Alice is in which of the two cases (that is, is she sending h51(k) or h47(k)?).

b)Suppose an attacker is passively sniffing all the traffic between Alice and the server. For those two cases (Alice is sending either h51(k) or h47(k)), the server should take very different actions to ensure security. What are those actions? And Why? Please explain

Question 2. Take the last four digits of ( 40104446) as the amount of storage available (e.g., if the number was 12345678 then the available storage would be 5678, that is, you could store at most five thousand six hundred and seventy eight password/hash values). Suppose every password can be 3 to 5 characters long, and each character can be either a lower or upper case English letter (A-Z) or number (0-9). How many columns should your Time Memory Tradeoff table. Please provide detailed explanation

Question 3. Consider thesimplified boot process shown in the picture.
(a) Suppose the hash function is collision freeand the BIOS can never be compromised. If we modify the AEGIS architecture such that level i+1 will compute and store the hash of level i+2after leveli has already computed and stored the hash of level i+1, how could an attacker modify the OS without being detected, and why?

2367_figure.jpg

b. Following 3(a), even if we use digital signatures instead of hash function (assuming the digital signature and private key are perfectly secure), the attackers could still modify the OS without being detected. Please explain why

Given the following Colored Petri Net, list all sequences of those events that will not be detected as attacks.

2249_figure1.jpg

Reference no: EM132489365

Questions Cloud

Derive the condition for the optimal rotation : Derive the condition for the optimal rotation when a forest also provides species habitat services.
Deworming intervention had positive externalities : If the school based deworming intervention had positive externalities, would regression analysis overestimate or underestimate the treatment impact of the progr
Determine how much will the preferred stockholders receive : Determine how much will the preferred stockholders receive. Assuming that $94000 will be distributed as a dividend in the current year
Calculate the point price elasticity of demand : Calculate the point price elasticity of demand at PS = $9000 (which should make QS = 101600). Does this elasticity (E) value indicate that Smooth Sailing
How many columns should your time memory tradeoff table : how could an attacker modify the OS without being detected, and why? How many columns should your Time Memory Tradeoff table.
Write down the formula for total revenue : Write down the formula for "total revenue". If price increases, what happens to quantity demanded? What happens to total revenue?
What is profit-maximizing markup : You are the owner of a Mom and Pop store that buys milk from a supplier at a cost of $1 per gallon. You estimate the elasticity of demand for milk sold
Determine and perform vertical analysis : Using these data from the comparative balance sheet of Ivanhoe Company, perform vertical analysis. (Round percentages to 1 decimal place, e.g. 12.5%.)
Profit-maximizing price to charge a texan : David is the owner-manager of a car wash in a small town in Texas, and his goal is to maximize profits. Based on David's experience, the elasticity of demand

Reviews

Write a Review

Operating System Questions & Answers

  Create digital files by employing a template

CDA 1330C - Operating Systems Course Project. Create digital files by employing a template to create a document in the proper file format

  Design several security awareness posters

With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.

  Operating system that supports a one-to-one relationship

Given an operating system that supports a one-to-one relationship between user-level threads and kernel-level threads and allows one or more threads from a process to issue blocking system calls while other threads (within that process) continue to r..

  Describe how that development can influence policy

Describe how that development can influence policy to solve a specific problem. Your comments should extend the conversation started with the thread.

  Develop and manage internet usage

Discuss how does management in business or education develop and manage Internet usage as it relates to research, supplemental resources and functional support? Explain your answer with examples.

  Describe the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  What do you understand by the term addressing structure

What do you understand by the term Addressing structure

  Explain primary advantages of gui over a textual interface

Assignment: Linux GUI- Explain the primary advantages of GUI over a textual (command-line) interface in Linux system administration.

  Is operating system reliability and protection enhanced

Provide the design and justification for your mechanism that supports process dispatching and  Is operating system reliability and protection enhanced with the microkernel approach to system design? Provide detailed support for your answer includi..

  Write a scholarly review of comparing any two os

Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember.

  Explain limitations of ray tracing

There are many ways to render an object and the selection depends on the use the work will be put to

  Assumptions and parameters affect sample size

If you do a quantitative study (SCHOOL ADVISORY PROGRAM) for your dissertation, you must estimate the sample size you will need in order to have a reasonable chance of finding a relationship among the variables stated in your research hypotheses (..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd