What is the corresponding key length in bits

Assignment Help Computer Engineering
Reference no: EM13704501

We now suppose the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password.

Question 1:  Assume a password consisting of 8 letters, where each letter is encoded by the ASCII scheme (7 bits per character, i.e., 128 possible characters).

What is the size of the key space which can be constructed by such passwords?

Question 2: What is the corresponding key length in bits?

Question 3: Assume that most users use only the 26 lowercase letters from the alphabet instead of the full 7 bits of the ASCII-encoding. What is the corresponding key length in bits in this case?

Question 4: At least how many characters are required for a password in order to generate a key length of 128 bits in case of letters consisting of

Part a: 7-bit characters?

Part b: 26 lowercase letters from the alphabet?

Can you show what the corresponding key length in bits is?

Verified Expert

If we assume a password consisting of 8 letters where each letter is encoded by the ASCII. It must contain at least one of the following such as Lower case letters, Upper case letters, Digits, Punctuation and Special characters. As we know that the general formula to calculate possible combination is n8

Reference no: EM13704501

Questions Cloud

Implement assembly language program to find greatest value : Write an assembly language program that will accept two 1-digit numbers (from 0 to 9) from the keyboard, compare the two numbers, and then print out the number of greatest value.
Evaluate the total average of all the inputs : Once the user enters in the desired amount of inputs, they will then select the second button "Calculate".
Create a short assembly program : You need to create a short assembly program named char_int, stored in file char_int.asm, that prompts the user for a character, and then for an integer.
Write a java program that creates 3 threads : Write a Java program that creates 3 threads each of them performing 10 reading/writing to the shared location. Use a random number generator to decide if the request is reading or writing
What is the corresponding key length in bits : What is the size of the key space which can be constructed by such passwords - What is the corresponding key length in bits?
Procedure just prints out the number 10 and returns : Your program will have three procedures. The main procedure (with the asm_main label), will sign on and them call a menu procedure that displays a two line menu:
Perform an attack against the cipher : Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?
Develop a set of six powerpoint : Develop a set of six PowerPoint or MS Word slides or six paragraphs to present the history, current level of usage, typical applications, future prospects and usability for the selected application.
Hazard detection : Repeat the same exercise for (a) and (b), but now use NOPs only when a hazard cannot be avoided by changing or rearranging these instructions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How could pdp augment memory in evaluating

How could PDP augment memory in evaluating the potential risk in this and other potentially threatening situations.

  Select an employee from the employee table

Choose a job_title_code in the job_title table. Increase the Minimum_salary and Maximum_salary for this job_title_code.

  What are the advantages of using voip

Conduct an Internet search to locate a case study that shows how VoIP was beneficial to the organization.

  What types on a lan and the type of software licensing

Discuss role of each of the following server types on a LAN and the type of software licensing with which the software should be purchased.

  Do you need to set up a new case for the hospitalization

A patient has been seeing the doctor regularly for treatment of diabetes. She was hospitalized yesterday, and the doctor saw her in the hospital for treatment of her diabetes. Do you need to set up a new case for the hospitalization

  Context free language

Let L1 be the regular language and L2 be the context-free language, both described over the same alphabet Σ. a) Is L1∩L2 always regular? Explain your claim.

  Find out local area network protocol over a nondeterministic

give the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol. Give a real life example of this advantage.

  Describe the information systems supporting the major

the final paper will demonstrate the students ability to assimilate synthesize and apply the concepts of management

  Using microsoft visio or an open source alternative such as

write a two to three page paper in which you using microsoft visio or an open source alternative such as dia create a

  Why are computer networks so tough to secure

define Why are computer networks so tough to secure.

  What will be the thoughts on training

This issue of training is so to each organization, so there is no one-size-fits-all plan. I do believe in training staff just before a new system is deployed, then provide regular update, new feature, best practice, and tips training on an ongoing..

  Write down a program called tripper.cgi

Write down a program called tripper.cgi that will ask the user the number of miles he has driven and the amount of gas he used. In the tripper script, write a subroutine called mileage that would calculate and return the user's mileage (miles per ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd