Question

A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each...

A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each character being either one of 26 lower-case letters (a-z), one of 26 upper-case letters (A-Z) or one of 10 integers (0-9). The hacker wants to infiltrate a website that has 2 million users. Assume, for simplicity, that each user is required to use a unique password. i. What is the expected number of attempts before the hacker successfully generates a user password? ii. What is the standard deviation of the number of attempts before the hacker successfully generates a user password? iii. Suppose the website used passwords of length four (instead of eight characters). What are the expected value and standard deviation of the number of attempts before the hacker successfully generates a user password? iv. Comment on the security differences between eight- and four-character passwords.

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
A hacker has programmed their computer to generate, uniformly at random, an eight-character password, with each...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A computer system uses passwords constructed from the 26 letters (a-z) or 10 integers (0-9). Suppose...

    A computer system uses passwords constructed from the 26 letters (a-z) or 10 integers (0-9). Suppose there are 10,000 users on the system with unique passwords. A hacker randomly selects (with replacement) passwords from the potential set. Round your answers to the nearest integer (a) There are 8,900 users with unique 6-character passwords on the system and the hacker randomly selects 6-character passwords. What is the mean and standard deviation of the number of attempts before the hacker selects a...

  • 3. A computer system uses passwords that contain exactly eight characters, and each character is one...

    3. A computer system uses passwords that contain exactly eight characters, and each character is one of the 26 lowercase letter (a -z) or 26 uppercase letters (A - Z) or 10 integers (0-9). Let Ω denote the set of all possible passwords. Suppose that all passwords in Ω are equally likely. Determine the probability for each of the following: (a) Password contains all lowercase letters given that it contains only letters (b) Password contains at least 1 uppercase letter...

  • 5. A hacker is trying to guess a password. They have worked out that the password has length 8, being a mix of 1 upperc...

    5. A hacker is trying to guess a password. They have worked out that the password has length 8, being a mix of 1 uppercase letter (from {A. . . . ,7), 5 lowercase letters (from {a, . . . ,:) and 2 digits (from 10,...,91). They do not know in which order these symbols occur in the password. [In this question, answers may be given as a product of integers, without evaluating further.] a) How many passwords fit this...

  • A computer system uses passwords that contain exactly 3 characters, and each character is one of the 26 lowercase l...

    A computer system uses passwords that contain exactly 3 characters, and each character is one of the 26 lowercase letters (a-z) or 26 uppercase letters (A-Z) or 10 integers (0-9). Let Ω denote the set of all possible passwords, and let and denote the events that consist of passwords with only letters or only integers, respectively Suppose that all passwords in 2 are equally likely. Determine the following probabilities. Round your answers to three decimal places (e.g. 98.765). (c) The...

  • 1.     This project will extend Project 3 and move the encryption of a password to a...

    1.     This project will extend Project 3 and move the encryption of a password to a user designed class. The program will contain two files one called Encryption.java and the second called EncrytionTester.java. 2.     Generally for security reasons only the encrypted password is stored. This program will mimic that behavior as the clear text password will never be stored only the encrypted password. 3.     The Encryption class: (Additionally See UML Class Diagram) a.     Instance Variables                                                i.     Key – Integer...

  • please solve all these questions 4 Customers who are registered on a corporate Web site are...

    please solve all these questions 4 Customers who are registered on a corporate Web site are summarized by the type of shipping contract they use and the number of orders in the previous month. The number of customers in each category are shown in the following table Shipping Contract Express Standard No orders One order More than one order Total Total 25 15 40 65 44 109 44 20 64 134 79 213 Suppose that three customers are selected randomly,...

  • please help me out and input values please .. main cpp.. please follow intructions exactly witj...

    please help me out and input values please .. main cpp.. please follow intructions exactly witj clarity please CSE 110-Intro to Computer Programming Project #3 Requirements-String Class Functions and Test Case Documentation Using the String Class, design and develop a multi-file password validation program and Test case Document (10% of grade) that requests a password, and validates it based on the following criteria. The password must be at least 8 characters long, contain at least one number, and at least...

  • JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information...

    JAVA Problem: With the recent news about data breaches and different organizations having their clients’ information being exposed, it is becoming more and more important to find ways to protect our sensitive data. In this program we will develop a simple tool that helps users generate strong passwords, encrypt and decrypt data using some cyphering techniques. You will need to create two classes. The first class is your driver for the application and contains the main method. Name this class...

  • JAVA MASTERMIND The computer will randomly select a four-character mastercode. Each character rep...

    JAVA MASTERMIND The computer will randomly select a four-character mastercode. Each character represents the first letter of a color from the valid color set. Our valid color choices will be: (R)ed, (G)reen, (B)lue and (Y)ellow. Any four-character combination from the valid color set could become the mastercode. For example, a valid mastercode might be: RGBB or YYYR. The game begins with the computer randomly selecting a mastercode. The user is then given up to 6 tries to guess the mastercode....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT