Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In a system,each user has an entry in the system's password file: ( y , s ) where y iscomputed as follows and s is

In a system,each user has an entry in the system's password file:(y,s)where y iscomputed as follows and s is a salt.
i.y=H(password,s) where H is SHA-1
ii.y=H(s,password)password
iii.y=H(s)H(password)
iv.y=E(s,password)where E is AES and the first input of E is the key
v.y=E(password,s)
vi.y=E(s,H(password))
vii.y=MAC(s,password)where MAC is HMAC and the first input of MAC is the key
viii. y=MAC(password,s)
List which of the methods above for computing y are secure against(precomputed)dictionary attack.Assume that s is 40 bits long and randomly chosen.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft Visual Basic 2005 For Windows Mobile Web Office And Database Applications Comprehensive

Authors: Gary B. Shelly, Thomas J. Cashman, Corinne Hoisington

1st Edition

0619254823, 978-0619254827

More Books

Students also viewed these Databases questions