Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Can you please code using python Question 5 (15 points): To reduce the exposure from a leaked passwords file, password files are usually kept in
Can you please code using python
Question 5 (15 points): To reduce the exposure from a leaked passwords file, password files are usually kept in a form which makes it easy to check if a given string is the correct password (of a given user), but harder to find the passwords given only the file. In this question we discuss the more basic form of this defense, where the file contains the hashed passwords. You are given another exposed passwords file, HashedPWs, which contains, for each user x, the results of applying a cryptographic hash function h(.)tothepasswordPWx of user x, i.e., h(PWx). (In the next question we will see an improved defense.) Cryptographic hash functions h (.) are efficient functions mapping from arbitrary-long strings into short, fixed-length strings, e.g., 160 bits. They have many applications, and several security requirements. The application of making it harder to abuse an exposed passwords file relies on the one-way property, which basically says that given h (pw), the hash of a password pw, should not help the attacker to find pw (or any other password pw which will hash to the same value, i.e., h(pw)=h(pw)). Write a new program, Break5.py, that uses the file HashedPWs to find, as quickly as possible, the passwords of these additional gang members. It will be infeasible to test all random passwords (why?); instead, focus on gang members who pick a random password from PwnedPWs100K, and concatenate to it two random digits. (Many users do such minor tweaks to their passwords, to bypass password-choice requirements, or in the incorrect hope that this suffices to prevent password guessing.). For gang members whose passwords you recover using HashedPWs, use Login.pyc to check if the gang member used the same password. Submit in the submission webserver: (only) the name and password of one gang member exposed (only) in this question. Submit in HuskyCT: Break5.py (as text within your report) and screen shot(s) of its run, printing out, for each gang member whose password was found, the name and password. Break5 should also print start/end time. Hint: think carefully how to do this efficiently, or it may be quite slow (which may be annoying, and may result in lower grade)Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started