Question

Suppose that you open an email account and you are told that you need six-character password...

Suppose that you open an email account and you are told that you need six-character password & the characters must be alpha-numeric ( either alphabetical or numerical). Assume that a lower case letter is different from an upper case one.
a) How many passwords are possible? Give the exact answer and do not use scientific notation. Show some work.
b) Suppose a computer hacker tries to guess what your password is by testing all possible passwords and it takes his program one second to test 400 passwords. What is the maximum amount of time (in hours) that it will take the hacker to discover your password? Let's assume that the hacker has a simple program that will randomly check all password and that it is allowed to use as much time as it needs. Show some work.
c) What is the probability that the hacker's program will discover your password in at most an hour? Write your answer as a fraction and a decimal rounded with three nonzero digits.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

a)

For each character there can be 26 lowercase alphabets, 26 uppercase alphabets or 10 numbers. So, each character can be any of 26+26+10 = 62 alphanumeric characters.

Number of unique six-character passwords = 626 = 56800235584

b)

The program takes one second to test 400 passwords.

For 56800235584 different passwords, the maximum amount of time required = 56800235584 / 400

= 142000589 seconds

= 142000589 / 3600 hours

= 39444.608 hours

c)

Since the hacker randomly check all password, we can assume that the time to discover the password follows uniform distribution with minimum value as 0 and maximum value as 39444.61 hrs.

Probability that the hacker's program will discover your password in at most an hour = P(X < 1)

= 1/39444.608

Add a comment
Know the answer?
Add Answer to:
Suppose that you open an email account and you are told that you need six-character password...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each...

    A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each character being either one of 26 lower-case letters (a-z), one of 26 upper-case letters (A-Z) or one of 10 integers (0-9). The hacker wants to infiltrate a website that has 2 million users. Assume, for simplicity, that each user is required to use a unique password. i. What is the expected number of attempts before the hacker successfully generates a user password? ii. What...

  • Please solve in Python. You would like to set a password for an email account. However,...

    Please solve in Python. You would like to set a password for an email account. However, there are two restrictions on the format of the password. It has to contain at least one uppercase character and it cannot contain any digits. You are given a string S consisting of N alphanumerical characters. You would like to find the longest substring of Sthat is a valid password. A substring is defined as a contiguous segment of a string. For example, given...

  • Suppose that passwords for an email provider: must be either 8 or 10 characters long are case-sensitive, can include digits, and can include any of 12 special characters cannot end in a special charac...

    Suppose that passwords for an email provider: must be either 8 or 10 characters long are case-sensitive, can include digits, and can include any of 12 special characters cannot end in a special character must contain at least one capital letter, one digit, or one special character (can contain more than one, just must contain at least one) How many different passwords are possible? Show your work. Work on the back of this sheet and attach additional sheets as necessary....

  • 2. You are making a new account on your favorite social media website. This great new...

    2. You are making a new account on your favorite social media website. This great new website offers the most fun way to steal all of your personal information! Long story short, you need a new password. ords can include upper-case letters, lower-case letters, numbers and the symbols you can r. Characters may be repeated. Please do not simplify your answers. get by holding Shift + a numbe (a) Suppose you want to make a 7, 8 or 9-character long...

  • Write a program that asks the user to enter a password, and then checks it for...

    Write a program that asks the user to enter a password, and then checks it for a few different requirements before approving it as secure and repeating the final password to the user. The program must re-prompt the user until they provide a password that satisfies all of the conditions. It must also tell the user each of the conditions they failed, and how to fix it. If there is more than one thing wrong (e.g., no lowercase, and longer...

  • Suppose that a password consists of 7 single-digit numbers (0-9). You are attempting to hack into...

    Suppose that a password consists of 7 single-digit numbers (0-9). You are attempting to hack into the account guarded by this password, and you write a program which just tries each possible password one at a time. If this program can try 21593 passwords per minute, what is the probability that you will be able to access the account today? Hint: there are 1,440 minutes in a day.

  • 1.     This project will extend Project 3 and move the encryption of a password to a...

    1.     This project will extend Project 3 and move the encryption of a password to a user designed class. The program will contain two files one called Encryption.java and the second called EncrytionTester.java. 2.     Generally for security reasons only the encrypted password is stored. This program will mimic that behavior as the clear text password will never be stored only the encrypted password. 3.     The Encryption class: (Additionally See UML Class Diagram) a.     Instance Variables                                                i.     Key – Integer...

  • some version of the scientific method many times in your litew the steps you were following...

    some version of the scientific method many times in your litew the steps you were following proved to be an efficient and effective way U Note: extbook and laboratory manual were discovered and verified by the same scientific process you'll use in this exercise. All th e information, concepts, and relationships you'll read about in your we'll be summarizing hundreds of years of study and experi- , and on the During this course mentation. Information presented on television, in newspapers...

  • For this lab you will write a Java program that plays a simple Guess The Word...

    For this lab you will write a Java program that plays a simple Guess The Word game. The program will prompt the user to enter the name of a file containing a list of words. These words mustbe stored in an ArrayList, and the program will not know how many words are in the file before it starts putting them in the list. When all of the words have been read from the file, the program randomly chooses one word...

  • Language: C++ PLEASE INCLUDE SCREENSHOT OF OUTPUT In this assignment, you will consider the problem of organizing a collection of computer user-ids and passwords. Each time a user logs in to the syste...

    Language: C++ PLEASE INCLUDE SCREENSHOT OF OUTPUT In this assignment, you will consider the problem of organizing a collection of computer user-ids and passwords. Each time a user logs in to the system by entering his or her user-id and a secret password, the system must check the validity of this user-id and password to verify that this is a legitimate user. Because this validation must be done many times each day, it is necessary to structure this information in...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT