Question

In: Computer Science

1-If attackers are able to get their hands on a password file, where all the passwords...

1-If attackers are able to get their hands on a password file, where all the passwords are hashed and salted, what would be their best approach to obtain at least one of these password?

Here an example of the first two lines of a generic password file:

HASH (SHA-256) SALT
1138275656b8e5d8f48a98c3c92df27e6fbfe24a750e72930c220a8e2caba935 535788591
ee65ef498fb368a2dfd38b40f0ee75c05963cd9da6e5f014118c7d9747fcc97f4 778035290

2-Play-Doh (Links to an external site.) has been used to get access to systems that used fingerprinting as access control (yup, and it worked 90% of the time with any scanner...)

Which of the following methods would be effective to avoid this kind of attack? Select all that apply.

Group of answer choices

a)The fingerprinting sensor should be able to recognize blood vessels and compute pressure and other kind of analysis

b)The fingerprinting sensor should be able to liquify the Play-Doh™ (around 1000 °F)

c)The fingerprinting sensor should actually be fake, letting the attackers waste their time playing with Play-Doh

d)The fingerprinting sensor should check for humidity levels of the finger

e)The fingerprinting sensor should emit a light to check if the pupil reacts

3-Suppose you receive a digital certificate that contains M and [h(M)]CA , where M = (Alice, Alice's public key) and "CA" is a Certificate Authority.

How do you verify the Signature?

Remember that:

[X]Bob indicates encryption via Bob's private key to X (signature)

h(X) indicates the cryptographic hash function applied to X

Group of answer choices

a)You decrypt the encrypted message using the CA's public key, then you compute the hash of M, finally you compare the two hashes

b)You decrypt the encrypted message using the CA's private key, then you compute the hash of M, finally you compare the two hashes

c)You decrypt the encrypted message using the CA's private key, then you compute the hash of [h(M)]CA, finally you compare the two hashes

d)You decrypt the encrypted message using the CA's public key, then you compute the hash of [h(M)]CA, finally you compare the two hashes

Solutions

Expert Solution

The answers for the given problem statements are as follows:

Which of the following methods would be effective to avoid this kind of attack? Select all that apply.

Group of answer choices

a)The fingerprinting sensor should be able to recognize blood vessels and compute pressure and other kind of analysis

b)The fingerprinting sensor should be able to liquify the Play-Doh™ (around 1000 °F)

c)The fingerprinting sensor should actually be fake, letting the attackers waste their time playing with Play-Doh

d)The fingerprinting sensor should check for humidity levels of the finger

e)The fingerprinting sensor should emit a light to check if the pupil reacts

3-Suppose you receive a digital certificate that contains M and [h(M)]CA , where M = (Alice, Alice's public key) and "CA" is a Certificate Authority.

How do you verify the Signature?

Remember that:

[X]Bob indicates encryption via Bob's private key to X (signature)

h(X) indicates the cryptographic hash function applied to X

Group of answer choices

a)You decrypt the encrypted message using the CA's public key, then you compute the hash of M, finally you compare the two hashes

b)You decrypt the encrypted message using the CA's private key, then you compute the hash of M, finally you compare the two hashes

c)You decrypt the encrypted message using the CA's private key, then you compute the hash of [h(M)]CA, finally you compare the two hashes

d)You decrypt the encrypted message using the CA's public key, then you compute the hash of [h(M)]CA, finally you compare the two hashes


Related Solutions

1) If a price that a perfectly competitive firm is able to get is above its...
1) If a price that a perfectly competitive firm is able to get is above its average variable cost but below its average total cost then a. The firm will suffer economic losses and should shut down immediately b. The firm will be able to earn economic profit as soon as it can increase the size of its factory c. The firm will suffer economic losses but should continue to operate d. None of the above 2) In the short...
1) If a price that a perfectly competitive firm is able to get is above its...
1) If a price that a perfectly competitive firm is able to get is above its average variable cost but below its average total cost then a. The firm will suffer economic losses and should shut down immediately b. The firm will be able to earn economic profit as soon as it can increase the size of its factory c. The firm will suffer economic losses but should continue to operate d. None of the above 2) In the short...
Please show all work in order to get credit on an excel file. If you provide...
Please show all work in order to get credit on an excel file. If you provide only the answers without showing your work, I will not be able to provide any credit if your answer is wrong. Petrus has an opportunity to make two investments, but he can only afford to make one of them. Each one costs $ 25,000,000. The first investment can be sold in 14 years for $ 98,500,000 and has no periodic cash flow. The second...
Please show all work in order to get credit on an excel file. If you provide...
Please show all work in order to get credit on an excel file. If you provide only the answers without showing your work, I will not be able to provide any credit if your answer is wrong. Mr. X bought a house for $293,000. He put 20% down and obtained a fully amortized monthly loan for the balance at 5.75% interest for 30 years. a. Find the amount of X’s monthly payment. b. Find the total interest paid by X....
1.Where does SANS get all of the information about attacks that are occurring? 2. What type...
1.Where does SANS get all of the information about attacks that are occurring? 2. What type of training or certification does SANS provide?
There are n people who can shake hands with one another (where n > 1). Use...
There are n people who can shake hands with one another (where n > 1). Use pigeonhole principle to show that there is always a pair of people who will shake hands with the same number of people. Hint. Pigeonhole principle does not immediately apply to this problem. Solve the problem for two cases: (1) There is no person who shakes hands with everyone else (all handshake numbers are strictly less than n − 1). Easy case. (2) There is...
I was able to get questions 1 - 4 answer and only need question 5 and...
I was able to get questions 1 - 4 answer and only need question 5 and its sub-parts. Asymmetric Information and Separating Equilibrium A population has two equal-sized members of "healthy" and "unhealthy" individuals. Members of each type have the same, identical, utility function: U = 20Y0.5 (i.e. 20 x Y raised to the 0.5 power), where Y is annual income.                            Assume each individual, in either group, has disposable income (after normal expenses) of $19,000 a year. If in...
Same topic: 1. Consider all passwords of length 10 made up of numbers, lower-case letters, and...
Same topic: 1. Consider all passwords of length 10 made up of numbers, lower-case letters, and upper-case letters (from the English alphabet). a) If you pick such a password at random, what is the likelihood that it contains exactly 5 lower-case letters? b) If you pick such a password at random, what is the likelihood that it contains at most 9 lower-case letters? 2. Suppose you’re an ornithologist who specializes in American crows (Corvus brachyrhynchos), and you’ve collected data on...
1. At the command prompt, use the where command to locate the where.exe file. Copy and...
1. At the command prompt, use the where command to locate the where.exe file. Copy and paste the full path and filename for the where.exe file into the space provided below. 2. At the command prompt, enter the following command and press enter. find "free beer" "c:\Program Files (x86)\Notepad++\*.txt" This command searches for the string "free beer" in all .TXT files in the Notepad++ program folder. According to the output of the find command, which of the files listed below...
1. Where is the task scheduler log file? What is the purpose to use it? Could...
1. Where is the task scheduler log file? What is the purpose to use it? Could it be useful to detect malware? Why or why not? 2. What is an mrt.log file? Where is it? What information does it provide? What other files are in that location?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT