Question

2. Trying the correctness of a password takes 1 millisecond in brute force attack. Assume that the user decides to use 6-char

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hey here is answer to your question.

In case of any doubt comment below. if you liked the answer feel free to upvote this.

So as its given that length is 6 chars and checking each password takes 1 mili second.

1. all lower case so each place can have a to z and total 6 places are there

means 26 * 26 * 26 * 26 * 26 * 26 = > ( 26 ) 6 = > 30,89,15,776 mili second or 308916 seconds.

2. lower case plus upper case means now each place can have either a to z or A to Z means 52 possible chars for each place

means ( 52 ) 6 = > 19770609664 mili seconds

3 now add the digits as well that is 0 to 9 means 10 more chars we can set in password means 62 chars in total.

( 62 ) 6 = >  56800235584 mili seconds

mili seconds or seconds can be later changed in bigger unit of time.

Add a comment
Know the answer?
Add Answer to:
2. Trying the correctness of a password takes 1 millisecond in brute force attack. Assume that...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each...

    A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each character being either one of 26 lower-case letters (a-z), one of 26 upper-case letters (A-Z) or one of 10 integers (0-9). The hacker wants to infiltrate a website that has 2 million users. Assume, for simplicity, that each user is required to use a unique password. i. What is the expected number of attempts before the hacker successfully generates a user password? ii. What...

  • Suppose that you open an email account and you are told that you need six-character password...

    Suppose that you open an email account and you are told that you need six-character password & the characters must be alpha-numeric ( either alphabetical or numerical). Assume that a lower case letter is different from an upper case one. a) How many passwords are possible? Give the exact answer and do not use scientific notation. Show some work. b) Suppose a computer hacker tries to guess what your password is by testing all possible passwords and it takes his...

  • If the password can contain upper/lower case letters, digits, or any of eight special symbols: (Note:...

    If the password can contain upper/lower case letters, digits, or any of eight special symbols: (Note: leave answers in exponent or simplified factorial form) How many different 8-character passwords are possible if characters cannot be repeated?

  • A computer system uses passwords that contain exactly 4 characters, and each character is 1 of...

    A computer system uses passwords that contain exactly 4 characters, and each character is 1 of the 3 lowercase letters (a, b, c) or 3 upper case letters (A, B, C) or the 5 odd digits (1, 3, 5, 7, 9). Let Ω denote the set of all possible passwords, and let A and B denote the events that consist of passwords with only letters or only integers, respectively. Determine the probability that a password contains only numbers given that...

  • 2. You are making a new account on your favorite social media website. This great new...

    2. You are making a new account on your favorite social media website. This great new website offers the most fun way to steal all of your personal information! Long story short, you need a new password. ords can include upper-case letters, lower-case letters, numbers and the symbols you can r. Characters may be repeated. Please do not simplify your answers. get by holding Shift + a numbe (a) Suppose you want to make a 7, 8 or 9-character long...

  • Can I please get some assistance on this? 1. Write a program to test the correctness...

    Can I please get some assistance on this? 1. Write a program to test the correctness of a password according to some rules. If the password is not valid, print messages showing what's wrong with the password. Partial program output should look like this: Please enter a password. It must be at least 8 characters long and contain at least 2 alpha characters, at least one upper case and one lower case, at least 1 numbers, and at least 1...

  • 1.     This project will extend Project 3 and move the encryption of a password to a...

    1.     This project will extend Project 3 and move the encryption of a password to a user designed class. The program will contain two files one called Encryption.java and the second called EncrytionTester.java. 2.     Generally for security reasons only the encrypted password is stored. This program will mimic that behavior as the clear text password will never be stored only the encrypted password. 3.     The Encryption class: (Additionally See UML Class Diagram) a.     Instance Variables                                                i.     Key – Integer...

  • 1. Write a C++ program called Password that handles encrypting a password. 2. The program must...

    1. Write a C++ program called Password that handles encrypting a password. 2. The program must perform encryption as follows: a. main method i. Ask the user for a password. ii. Sends the password to a boolean function called isValidPassword to check validity. 1. Returns true if password is at least 8 characters long 2. Returns false if it is not at least 8 characters long iii. If isValidPassword functions returns false 1. Print the following error message “The password...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • 6.15 Program 6: Using Arrays to Count Letters in Text 1. Introduction In this program, you...

    6.15 Program 6: Using Arrays to Count Letters in Text 1. Introduction In this program, you will practice working with arrays. Your program will read lines of text from the keyboard and use an array to track the number of times each letter occurs in the input text. You will use the contents of this array to generate a histogram (bar graph) indicating the relative frequencies of each letter entered. Test cases are available in this document. Remember, in addition...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT