Question

In: Computer Science

CAN I HAVE A 200 WORD EXPLANATION FOR THE FOLLOWING QUESTION. Analyse the security of Lamport’s...

CAN I HAVE A 200 WORD EXPLANATION FOR THE FOLLOWING QUESTION.

Analyse the security of Lamport’s OLP algorithm with the properties of hash function

Solutions

Expert Solution

  - The Lamport's OLP algorithm is based on Mathematical Approcah, to genrate "passwords" or "keys"

- The Lamport's OLP algorithm is basically use for the Security Purpose and also it is easy to use.

- The Lamport's OLP algorithm is used to create One-Time passwords.

-  ie. means which provides effective security for those multiple people who are located at different systems, but seems that they are interacting with single system.

- To maintain confidentiality of data, this approach is very useful, such as OTP (One - time password) to access or gain OTP - this is not easy to third party to access such sensitive information.

- A Hash Function Is nothing but a numerical Value of secure or fix range which identifies data in Unique manner.

- Hash function is special type of function which takes input as a variable/ Changed length (Multiple digits) and gives output in fixed/UnChanged  length.( Single digit)

- We receive the fixed output in fixed length ie means in single digit , range may be 0-9 digit  

- mod is also treats as hash function and gives fixed output.  

- ie means which Uniquely identifying the data, that's why it is easy to retrieve data from container / tables or we can say from database.

- Hash Function is also use in cryptography.

- For example :- Hash function is also use to generate the OTP


Related Solutions

Analyse the security of Lamport’s OLP algorithm with the properties of hash function.
Analyse the security of Lamport’s OLP algorithm with the properties of hash function.
Hey can you please answer this question in detail and explanation in your own word i...
Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board Perform a Internet search upon the term and concept black box as it pertains to computer science. Why is this an important concept within software design and development? Why is this concept important within the context of code reuse? Be sure to give thought to each assigned question before posting.
Hey can you please answer this question in detail and explanation in your own word i...
Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board Are there ethical issues to consider when designing a database? For example, should highly sensitive personal data (such as patient medical information) be stored in the same database that manages and contains office supply inventories? Why or why not? Suggest three situations where referential integrity and relationships, inherent in a relational database management system (RDBMS), avoids data problems....
Hey can you please answer this question in detail and explanation in your own word i...
Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board If you were to perform the analysis and develop a logical model for the college's course registration system, would it be better to use a top-down approach or a bottom-up strategy (or another approach...be sure to describe). What are the reasons for your approach decision? Use a scenario from everyday life to create a basic decision table with...
Hey can you please answer this question in detail and explanation in your own word i...
Hey can you please answer this question in detail and explanation in your own word i need to post in discussion board You are working as a system analyst for a consulting firm contracted by a college to create a management system for its students. During the process you create a state transition diagram for an object called Students. What are the possible states of a student? And what happens to a student who stops attending the college for a...
Kindly provide a detailed explanation to the following question. So i can understand and solve on...
Kindly provide a detailed explanation to the following question. So i can understand and solve on my own Milden Company has an exclusive franchise to purchase a product from the manufacturer and distribute it on the retail level. As an aid in planning, the company has decided to start using a contribution format income statement. To have data to prepare such a statement, the company has analyzed its expenses and has developed the following cost formulas. Cost of goods sold...
I need a detail explanation of a Cyber Security Project you might have worked on or...
I need a detail explanation of a Cyber Security Project you might have worked on or know about or maybe any project topics or ideas would work.
a) In not less than 200 words, analyse the impact of coronavirus outbreak on i.) the...
a) In not less than 200 words, analyse the impact of coronavirus outbreak on i.) the natural rate of unemployment in Hong Kong and ii.) the cyclical unemployment in Hong Kong.
I have a question that I would like an explanation on how an ethical hacker uses...
I have a question that I would like an explanation on how an ethical hacker uses the information derived by use of Nslookup and Whois to mitigate network connectivity issues. If you could explain in a paragraph it would help me tremendously.
Develop a 150 to 200 word posting that responds to the following question: How might the...
Develop a 150 to 200 word posting that responds to the following question: How might the value process frameworks help companies avoid faulty e-commerce strategies? Another way to pose this question would be: What strategic insights might be gained from such models that may not be self-evident to business strategists within a given company? Provide an example in your posting.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT