Reference no: EM13704501
We now suppose the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password.
Question 1: Assume a password consisting of 8 letters, where each letter is encoded by the ASCII scheme (7 bits per character, i.e., 128 possible characters).
What is the size of the key space which can be constructed by such passwords?
Question 2: What is the corresponding key length in bits?
Question 3: Assume that most users use only the 26 lowercase letters from the alphabet instead of the full 7 bits of the ASCII-encoding. What is the corresponding key length in bits in this case?
Question 4: At least how many characters are required for a password in order to generate a key length of 128 bits in case of letters consisting of
Part a: 7-bit characters?
Part b: 26 lowercase letters from the alphabet?
Can you show what the corresponding key length in bits is?
Implement assembly language program to find greatest value
: Write an assembly language program that will accept two 1-digit numbers (from 0 to 9) from the keyboard, compare the two numbers, and then print out the number of greatest value.
|
Evaluate the total average of all the inputs
: Once the user enters in the desired amount of inputs, they will then select the second button "Calculate".
|
Create a short assembly program
: You need to create a short assembly program named char_int, stored in file char_int.asm, that prompts the user for a character, and then for an integer.
|
Write a java program that creates 3 threads
: Write a Java program that creates 3 threads each of them performing 10 reading/writing to the shared location. Use a random number generator to decide if the request is reading or writing
|
What is the corresponding key length in bits
: What is the size of the key space which can be constructed by such passwords - What is the corresponding key length in bits?
|
Procedure just prints out the number 10 and returns
: Your program will have three procedures. The main procedure (with the asm_main label), will sign on and them call a menu procedure that displays a two line menu:
|
Perform an attack against the cipher
: Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?
|
Develop a set of six powerpoint
: Develop a set of six PowerPoint or MS Word slides or six paragraphs to present the history, current level of usage, typical applications, future prospects and usability for the selected application.
|
Hazard detection
: Repeat the same exercise for (a) and (b), but now use NOPs only when a hazard cannot be avoided by changing or rearranging these instructions.
|