Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Can you please code using python Question 5 (15 points): To reduce the exposure from a leaked passwords file, password files are usually kept in

Can you please code using pythonimage text in transcribed

Question 5 (15 points): To reduce the exposure from a leaked passwords file, password files are usually kept in a form which makes it easy to check if a given string is the correct password (of a given user), but harder to find the passwords given only the file. In this question we discuss the more basic form of this defense, where the file contains the hashed passwords. You are given another exposed passwords file, HashedPWs, which contains, for each user x, the results of applying a cryptographic hash function h(.)tothepasswordPWx of user x, i.e., h(PWx). (In the next question we will see an improved defense.) Cryptographic hash functions h (.) are efficient functions mapping from arbitrary-long strings into short, fixed-length strings, e.g., 160 bits. They have many applications, and several security requirements. The application of making it harder to abuse an exposed passwords file relies on the one-way property, which basically says that given h (pw), the hash of a password pw, should not help the attacker to find pw (or any other password pw which will hash to the same value, i.e., h(pw)=h(pw)). Write a new program, Break5.py, that uses the file HashedPWs to find, as quickly as possible, the passwords of these additional gang members. It will be infeasible to test all random passwords (why?); instead, focus on gang members who pick a random password from PwnedPWs100K, and concatenate to it two random digits. (Many users do such minor tweaks to their passwords, to bypass password-choice requirements, or in the incorrect hope that this suffices to prevent password guessing.). For gang members whose passwords you recover using HashedPWs, use Login.pyc to check if the gang member used the same password. Submit in the submission webserver: (only) the name and password of one gang member exposed (only) in this question. Submit in HuskyCT: Break5.py (as text within your report) and screen shot(s) of its run, printing out, for each gang member whose password was found, the name and password. Break5 should also print start/end time. Hint: think carefully how to do this efficiently, or it may be quite slow (which may be annoying, and may result in lower grade)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Sybase Database Administrators Handbook

Authors: Brian Hitchcock

1st Edition

0133574776, 978-0133574777

More Books

Students also viewed these Databases questions

Question

Prove the properties of the radar ambiguity function.

Answered: 1 week ago