The relation between passwords and key size

Assignment Help Computer Network Security
Reference no: EM13168517

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password.

1. Assume a password consisting of 8 letters, where each letter is encoded by the

ASCII scheme (7 bits per character, i.e., 128 possible characters). What is the

size of the key space which can be constructed by such passwords?

2. What is the corresponding key length in bits?

3. Assume that most users use only the 26 lowercase letters from the alphabet instead of the full 7 bits of the ASCII-encoding. What is the corresponding key

length in bits in this case?

4. At least how many characters are required for a password in order to generate a key length of 128 bits in case of letters consisting of

a. 7-bit characters?

b. 26 lowercase letters from the alphabet?

Reference no: EM13168517

Questions Cloud

What would be the total revenue at the breakeven point : What are the expected benefits of the implementation of an effective system of internal controls for an organization and what would be the total revenue at the breakeven point?
Explain what mass of co2 and h20 would be produced during : What mass of CO2 and H20 would be produced during the combustion analysis of 0.1674 g of the cobalamin?
The program calls a function called getgrades : The program calls a function called GetGrades that will read in grades from the keyboard, the number of grades should also be input by the user.
Write a program that calculates net pay : Write a program that calculates Net Pay. It should do this by calling a function called CalNetPay that calculates and returns Net Pay when given the hours worked and the hourly pay rate. The main function should pass the hours worked and pay rate ..
The relation between passwords and key size : the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password
Write a program that will call a function : Write a program that will call a function called writeDataToFile to prompt a user for their first name, last name and zip code, and print this information to a file called "UserData.txt". The main function should prompt the user for the same infor..
The main function should prompt the user : The main function should prompt the user for the 2 numbers, call the function to display the correct label, then calculate and display the sum of the numbers. Call the function to display the correct label, then calculate and display the differenc..
What are bufferedinput/outputstreams : What are BufferedInput/OutputStreams and why are they used? Write some Java code to illustrate how to create a BufferedInputStream.
Prepare a pension worksheet for the pension plan : Prepare a pension worksheet for the pension plan in 2012 and prepare any journal entries related to the pension plan that would be needed at December 31, 2012.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  C program encryption-decryption system using caesar cipher

Program "Encryption/Decryption"system only the code by using C programming work with PUTTY use Caesar cipher.

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd