What is the expected time to discover the correct password

Assignment Help Computer Engineering
Reference no: EM133558438

Question  1- Explain the suitability or unsuitability of the following passwords:

a. YK 334

b. mfmitm (for "my favorite movie is tender mercies)

c. Natalie1

d. Washington

e. Aristotle

f. tv9stove

g. 12345678

h. dribgib

• Use the "comprehensive8" rule to explain suitability or unsuitability.

Question 2-Assume passwords are selected from four-character combinations of 26 alphabetic characters. Assume an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password?

• Recall that the number of possible combinations in the case of binary alphabet {1,0} is equal to 2^N, where N is the number of alphabet positions.

• Similarly, the number of possible combinations in the case of English alphabet {a,b,c,...z} is equal to 26^N, where N is the number of alphabet positions.

• On average, the expected number of attempts to discover the correct combination is half of the total number of attempts.

Question 3-Find and view several YouTube videos explaining biometric accuracy, specifically the false match rate (a.k.a. false accept rate) vs. the false nonmatch rate (a.k.a. false reject rate) (Textbook, pp. 89-92). Identify the URLs for three videos that you think do excellent job explaining. If you had to select only one video to recommend to fellow business students, which would you choose? Why?

Reference no: EM133558438

Questions Cloud

Explanation of the delinquent subculture theory : Identify who created the Delinquent Subculture. Provide a definition or explanation of the delinquent subculture theory,
What are the most frequent common expressions : PSYC 700- What are the most frequent common expressions? What are some of the common words, phrases, or ideas that you see in the various responses?
Impact of digital marketing on customer behavior : The impact of digital marketing on customer behavior and purchase choices.
Explain what monitoring and reconnaissance : Explain what monitoring and reconnaissance. This topics are under Security Awareness. Clearly explain the topic with prevention techniques and real-world
What is the expected time to discover the correct password : what is the expected time to discover the correct password? Identify the URLs for three videos that you think do excellent job explaining.
Average asset turnover ratio or operating expense ratio : cash rents 1,200 crop acres and owns 240 acres be more likely to have a better-than-average asset turnover ratio or operating expense ratio?
Goals or key performance indicators the company : Tell me the goals or key performance indicators the company might use at each stage in the AIDA sales funnel.
What are the CSR external issues in staples : What are the CSR external issues in staples ? It should be explanation of the each CSR External issues of staples
Modify previous to allow the user to enter name-score pairs : Modify previous to allow the user to enter name-score pairs. For each student taking a test, the user types a string representing the name of the student

Reviews

Write a Review

Computer Engineering Questions & Answers

  How do the different roles of system software affect you

How do the different roles of system software and application software affect you as a business end-user? How do you see this changing in the future?

  Why would designers install software into the kernel at all

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)?

  What challenges remain in the field of ai for researcher

What challenges remain in the field of AI for researcher/scientists. What are some of the technologies that is fueling rapid development and advancement of AI.

  List the control signals needed for the stack-based alu

A hardware stack is used to evaluate arithmetic expressions. The expressions can contain both REAL and INTEGER values. The data representation contains a TAG.

  Discuss problem of selection of models and hyperparameters

Discuss the problem of the selection of models and hyperparameters, including: ways to partition the data to guide the selection dealing with overfitting

  Create a program called arithmetic

Prompt for and accept two int values. Display the remainder when the first integer is divided by the second using 1 single operation.

  Show the fetch and execute cycles for this instruction

Show any modification that is needed to the data path to support the execution of this instruction if any.

  Demonstrate applied use offoreground color and change

Demonstrate applied use offoreground color and change in console title Classes created and apply generics, abstract, and polymorphism

  Would you place the newer versions of microsoft server

would you place the newer versions of Microsoft Server operating systems comparable to Linux robust security systems or better?

  Identify emergent application of currently existing solution

Students may choose a new, original technology solution, or identify the emergent application of a currently existing solution.

  Why are conformance levels important

Why are conformance levels important? What is the Microsoft.NET Framework? What basic elements does it include?

  Discuss possible strategies adopted by programming language

Discuss the possible strategies adopted by a programming language to bind a finite mapping to a specific finite domain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd