Question

How to calculate the number of attempts necessary to break a password that uses secure hash...

How to calculate the number of attempts necessary to break a password that uses secure hash functions?

Example: How many attempts would it take to break an 8 character (only lower case) long password stored as a 32 bit long hash value?

26^8 or would it be more like 2^26 * 8 * 2^32 attempts?

1 0
Add a comment Improve this question Transcribed image text
Answer #1

So to understand this let us build from smaller number of characters

Take 1 character for example .number of attempts necessary?

So obviously answer is 26 as there are 26 different lower case alphabets.

Now take 2 characters.number of attempts necessary?

In this case if the first character is 'a' then second character cab be any one out of 'a' to 'z' So 26 combinations with 'a' as first character

Similarly if first character is 'b' then swcond character be again any one out of 26 character so 26 combinations with 'b' as first character

This is true for all 26 characters

So 26 is added 26 times

that is 26 * 26

Anothere way to understand is first character has 26 options. second option has 26 options and they are not dependent on each other

so 26*26

So for 3 characters

Ans is 26*26*26

For 4 characters ans is 26*26*26*26 = 26^4

So for n character ans is 26^n

Heres something general answer for you

Let there be p options for each character instead of 26 and length of password is 'n'

So ans will be p^n

Please comment for any further assistance

Add a comment
Know the answer?
Add Answer to:
How to calculate the number of attempts necessary to break a password that uses secure hash...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value...

    In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value by applying the following equation: Ci = bi1⊕bi2⊕bi3⊕bi4⊕bi5⊕bi6⊕bi7⊕bi8 Every block of 8 bits constitutes an ASCII-encoded character. 1. “Break” the hash function by pointing out how it is possible to find (meaningful) character strings which result in the same hash value. Provide an appropriate example. 2....

  • 1. Write a C++ program called Password that handles encrypting a password. 2. The program must...

    1. Write a C++ program called Password that handles encrypting a password. 2. The program must perform encryption as follows: a. main method i. Ask the user for a password. ii. Sends the password to a boolean function called isValidPassword to check validity. 1. Returns true if password is at least 8 characters long 2. Returns false if it is not at least 8 characters long iii. If isValidPassword functions returns false 1. Print the following error message “The password...

  • 10. Submission In this question you will work with a hash table that uses double hashing. The hash table is size 11, the primary hash function is h(K)-K mod 11, and the secondary hash function is hp(...

    10. Submission In this question you will work with a hash table that uses double hashing. The hash table is size 11, the primary hash function is h(K)-K mod 11, and the secondary hash function is hp(K)-(K mod9) +1 Take an empty hash table. Take your student number and split it into 4 2-digit integers. Insert each of these 2-digit numbers in the order in which they appear in your student number into the empty heap. Then insert the values...

  • 1.     This project will extend Project 3 and move the encryption of a password to a...

    1.     This project will extend Project 3 and move the encryption of a password to a user designed class. The program will contain two files one called Encryption.java and the second called EncrytionTester.java. 2.     Generally for security reasons only the encrypted password is stored. This program will mimic that behavior as the clear text password will never be stored only the encrypted password. 3.     The Encryption class: (Additionally See UML Class Diagram) a.     Instance Variables                                                i.     Key – Integer...

  • In this problem, you will examine why techniques that work nicely for error correction codes are...

    In this problem, you will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. You will look at a hash function that computes an 8- bit hash value by applying the following equation: Ci = bi1 (+) bi2 (+) bi3 (+) bi4 (+) bi5 (+) bi6 (+) bi7 (+) bi8 where (+) = xor The Word CRYPTO hashes in: 111010 1. “Break” the hash function by pointing out how it is possible...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • Cryptology 1.4. We now consider the relation between passwords and key size. For this purpose we...

    Cryptology 1.4. We now consider the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password. 1. Assume a password consisting of 8 letters, where each letter is encoded by the ASCII scheme (7 bits per character, i.e., 128 possible characters). What is the size of the key space which can be constructed by such passwords? 2. What is the corresponding key length in bits?...

  • IN DETAIL EXPLAIN Problem 1: (a) An outfit consists of a blouse and a skirt. If...

    IN DETAIL EXPLAIN Problem 1: (a) An outfit consists of a blouse and a skirt. If there are 6 skirts and 8 blouses from which to choose, then how many possible blouse-skirt choices are there? (b) In the worst case, how many attempts would a hacker try before finding a password given that it is 8 characters long that can be case-sensitive alphabetic, 10 digit, or the seven punctuation characters of!, a, S, &, *, G) Example valid passwords: aaaaaaaa,...

  • Hexadecimal and binary numbers questions. Can someone do number #5 and 6 only? Thank you. 5....

    Hexadecimal and binary numbers questions. Can someone do number #5 and 6 only? Thank you. 5. (2 pts) Write, in hexadecimal, the largest (unsigned) number that can be stored in 32 bits. 6. (2 pts) How many hexadecimal digits are required to write down a 2048-bit number? 7. (2 pts) How many hexadecimal digits are required to write down a 320-byte number? 8. (2 pts) How many bytes does it take to store a 128-bit number in a computer?

  • Break-Even Analysis Break-even analysis attempts to determine the volume of sales necessary for a manufacturer to...

    Break-Even Analysis Break-even analysis attempts to determine the volume of sales necessary for a manufacturer to cover costs or to make revenue equal costs. It is helpful in setting prices, estimating profit or loss potentials, and determining the discretionary costs that should be incurred. The general formula for calculating break-even units is Break-Even Units = Total Fixed Costs / ( Unit Selling Price − Unit Variable Cost ) 1. Use the formula to calculate how many cups of coffee an...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT