Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected from the above character set (and can be from any of the character type). For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be considered unacceptable (with respect to the prescribed format). The bank also requires that each password be changed at least once every five years. 1. Assume that 1,000,000 passwords can be tested per second, calculate the probability that a hacker can guess a password in the timeframe between two consecutive changes.. 2. A hacker controls a network of compromised machines (botnet) that can be used to launch the attack. The network consists of 500,000 compromised machines (bots) located in different countries around the globe. Assume that the machines have approximately the same computing capability. The hacker uses a simple strategy consisting of slicing the username space in subsets of equal size, and assigning a subset to each of the bots to conduct the attack in parallel. Calculate the probability that a successful password guess can be obtained in the timeframe between two consecutive changes. Briefly comment the results In order to strengthen the above password scheme, the bank investigates the following two different solutions:

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
icon
Concept explainers
Question
Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are
encouraged) in PDF format through Blackboard using the following file name format:
LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten.
All the assignments in this course are individual work; any overlap between assignment reports will be
penalized.
A bank requires for their customers to access their online banking accounts to provide as
User Id (or user name) the last 8 digits of their bank card number, and a password with a
length between 8 and 12 ASCII characters, including the following restrictions (posted on
their website):
Passwords must have at least 8 characters long and at most 12 characters long, and must include at least
one character from each of the following four character types:
Upper case letters ABC DEF
Lower case letters ghijkl
Numbers 1 2 345 67890
Special characters ! @ # $ % ^ & * (+) = -
The remaining characters of the password must be selected from the above character set (and can be from
any of the character type).
For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be
considered unacceptable (with respect to the prescribed format).
The bank also requires that each password be changed at least once every five years.
1. Assume that 1,000,000 passwords can be tested per second, calculate the
probability that a hacker can guess a password in the timeframe between two
consecutive changes..
2. A hacker controls a network of compromised machines (botnet) that can be used
to launch the attack. The network consists of 500,000 compromised machines
(bots) located in different countries around the globe. Assume that the machines
have approximately the same computing capability. The hacker uses a simple
strategy consisting of slicing the username space in subsets of equal size, and
assigning a subset to each of the bots to conduct the attack in parallel. Calculate
the probability that a successful password guess can be obtained in the timeframe
between two consecutive changes. Briefly comment the results
In order to strengthen the above password scheme, the bank investigates the following
two different solutions:
Transcribed Image Text:Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected from the above character set (and can be from any of the character type). For example, an acceptable password sample is gB21@hill while gPanth2! and A@a#CDEF&* will be considered unacceptable (with respect to the prescribed format). The bank also requires that each password be changed at least once every five years. 1. Assume that 1,000,000 passwords can be tested per second, calculate the probability that a hacker can guess a password in the timeframe between two consecutive changes.. 2. A hacker controls a network of compromised machines (botnet) that can be used to launch the attack. The network consists of 500,000 compromised machines (bots) located in different countries around the globe. Assume that the machines have approximately the same computing capability. The hacker uses a simple strategy consisting of slicing the username space in subsets of equal size, and assigning a subset to each of the bots to conduct the attack in parallel. Calculate the probability that a successful password guess can be obtained in the timeframe between two consecutive changes. Briefly comment the results In order to strengthen the above password scheme, the bank investigates the following two different solutions:
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Query Syntax
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education