Question

5. A hacker is trying to guess a password. They have worked out that the password has length 8, being a mix of 1 uppercase le

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a.

In the position where we have a uppercase letter, there are 26 different ways to fill this position. Further for positions where we have lower case letters, again there are 26 ways to fill them. We have 5 such positions to fill. So total ways to fill this 5 spots will be 26x26x26x26x26=26^5. Lastly for positions where we have digits from 0 to 9, there will be 10 ways to fill them. We have 2 such positions to fill, which can be done in 10x10=100 ways.

But we have 8 different spots and we can arrange the available characters in 8! ways. This is to account for the fact that any digit character (0 to 9) any uppercase character or any lower case character, can take any of the available 8 positions.

So, the total possible passwords will be,

(26)(26^5)(100)(8!)

b.

If all 8 symbols in the password are to be different , that means if we have say "a" at one position, we can't have it again in any other position, although we will have 4 more positions to fill with lower case letters. Similarly if we have "0" in one position we can't have it in any other position, although we will have 1 more position to fill with a digit. (As we only have one spot to fill with uppercase letters we don't need to consider any change in number of ways for this)

So the total passwords possible will be,

(26)(26x25x24x23x22)(10x9)(8!)

c.

If one position is known then we have only 7! ways left to arrange characters in 7 remaining positions. Also, we know that one lower case character is "w" which leaves us with 25 lower case characters to fill 4 more positions in which there will be a lower case character. i.e. 25x24x23x22. There will be no change in the number of ways for arrangement of uppercase characters and digits

So, the number of ways will be,

(26)(25x24x23x22)(10x9)(7!)

d.

Considering that the program has to go through all the possible passwords before it cracks the correct one, then at a speed of 6000 per sec , the total time required to crack the password will be,

t=(26)(25x24x23x22)(10x9)(7!)/(6000) = 596,756,130 secs

In minutes it will be,

(596,756,130)/60 = 9,945,936 mins

Add a comment
Know the answer?
Add Answer to:
5. A hacker is trying to guess a password. They have worked out that the password has length 8, being a mix of 1 upperc...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Suppose that you open an email account and you are told that you need six-character password...

    Suppose that you open an email account and you are told that you need six-character password & the characters must be alpha-numeric ( either alphabetical or numerical). Assume that a lower case letter is different from an upper case one. a) How many passwords are possible? Give the exact answer and do not use scientific notation. Show some work. b) Suppose a computer hacker tries to guess what your password is by testing all possible passwords and it takes his...

  • PYTHON 1.Guessing many passwords: Write a function called guess_passwords. It doesn't take any arguments. It should use the function guess, trying out as many possible passwords as possible. Here...

    PYTHON 1.Guessing many passwords: Write a function called guess_passwords. It doesn't take any arguments. It should use the function guess, trying out as many possible passwords as possible. Here are some methods you might try: Try out a hardcoded list of strings that you think people might use as passwords. Try out all words in the word file. Try out all character combinations of length 4 or less (or more if you don't mind waiting). Try out combinations of words...

  • 1. (5) Suppose we have a set of small wooden blocks showing the 26 letters of the English alphabe...

    1. (5) Suppose we have a set of small wooden blocks showing the 26 letters of the English alphabet, one letter per block. (Think of Scrabble tiles.) Our set includes 10 copies of each letter. We place them into a bag and draw out one block at a time. (a) If we line up the letters on a rack as we draw them, how different ways coukl we fill a rack of 5 letters? (b) Now suppose we just toss...

  • Alice wants to evaluate a picture-based password system. The system has a database of 100 different...

    Alice wants to evaluate a picture-based password system. The system has a database of 100 different pictures. To select a password, the user is allowed to browse through the database of pictures and select 20 pictures as their password. To authenticate, the user is presented with 20 challenges. Each challenge consists of 2 pictures displayed to the user: one is randomly chosen from the user's password set, and the other is randomly chosen from the remaining 80 pictures. The user...

  • I have to use java programs using netbeans. this course is introduction to java programming so...

    I have to use java programs using netbeans. this course is introduction to java programming so i have to write it in a simple way using till chapter 6 (arrays) you can use (loops , methods , arrays) You will implement a menu-based system for Hangman Game. Hangman is a popular game that allows one player to choose a word and another player to guess it one letter at a time. Implement your system to perform the following tasks: Design...

  • 1) A: List all possible outcomes (the sample space) for the tree diagram below B: Calculate...

    1) A: List all possible outcomes (the sample space) for the tree diagram below B: Calculate the number of all possible outcomes: bb 2) Based on the tree diagram below, how many ways can a coin be tossed four times and get exactly 3 tails? Hнн HHT HHHH HHHT HHTH H HTT HTHH HTHT HTTH HTTT THH T THT TTHS THHH THHT THTH THTT TTHH ΤΤΗΤ ΤΤΤΗ ΤΤΤΤ ΤΤΤ 3) How many 12-letter "words" (real or made-up) can be made...

  • For this lab you will write a Java program that plays a simple Guess The Word...

    For this lab you will write a Java program that plays a simple Guess The Word game. The program will prompt the user to enter the name of a file containing a list of words. These words mustbe stored in an ArrayList, and the program will not know how many words are in the file before it starts putting them in the list. When all of the words have been read from the file, the program randomly chooses one word...

  • discrete math 1. Suppose that three friends, all heavy smokers, each have a 50-50 chance of...

    discrete math 1. Suppose that three friends, all heavy smokers, each have a 50-50 chance of developing lung cancer (a) Tracking whether each of the friends develops hung cancer, write down the sample space by listing its elements. Be clear about any notation that you choose to use. (b) What is the probability that exactly one of the friends develops lung cancer? (c) What is the probability that at least two of the friends develop lung cancer? 2. Six people...

  • Can Dogs Understand Human Cues? EXPLORATION Dogs have been domesticated for about 14,000 years. In that...

    Can Dogs Understand Human Cues? EXPLORATION Dogs have been domesticated for about 14,000 years. In that time, have they been able to develop an understanding of human gestures such as pointing or glancing? How about simi lar nonhuman cues? Researchers Udell, Giglio, and Wynne tested a small number of dogs in order to answer these questions. In this exploration, we wll first see whether dogs can understand human gestures as well as nonhuman gestures. To test this, the researchers positioned...

  • 1 Overview The goal of this assignment is to help you understand caches better. You are...

    1 Overview The goal of this assignment is to help you understand caches better. You are required to write a cache simulator using the C programming language. The programs have to run on iLab machines. We are providing real program memory traces as input to your cache simulator. The format and structure of the memory traces are described below. We will not give you improperly formatted files. You can assume all your input files will be in proper format as...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT