Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

use matpolib in phyton O O Your computer system uses a 4-letter password for login. For our purposes the password is restricted to lower case

use matpolib in phyton

image text in transcribed

O O Your computer system uses a 4-letter password for login. For our purposes the password is restricted to lower case letters of the alphabet only. It is easy to calculate that the total number of passwords which can be produced is n=264. A hacker creates a list of m random 4-letter words, as candidates for matching the password. Note that it is possible that some of the m words may be duplicates. The number m that you must use has been given to you. You are given your own 4-letter password and you are going to check if the hacker's list contains at least one word that matches your password. This process of checking is considered one experiment. If a word in the list matches your password, the experiment is considered a success. Repeat the experiment for N = 1000 times and find the probability that at least one of the words in the hacker's list will match your password. The hacker creates a longer list of k*m random 4-letter words. The numbers k and m have been given to you. Repeat the previous experiment for N = 1000 times and find the probability that at least one of the words in the hacker's list will match your password. o Repeat the previous experiment for N = 1000 times to find the approximate number (m) of words that must be contained in the hacker's list so that the probability of at least one word matching the password is p=0.5. You should do this by trial and error: assume a value for (m) and calculate the corresponding probability as you did in the previous part. The answer will be value of (m) that makes this probability approximately equal to p=0.5. O SUBMIT a report that follows the guidelines as described in the syllabus. > The section on RESULTS must include the calculated answer. Use the table below for your answer. Note: You will need to replicate the table in your Word file, in order to provide the answer in your report. Points will be taken off if you do not use the table. The code must be provided in the appendix Hacker creates m words Prob. that at least one of the words matches the password p = Hacker creates k*m words Prob. that at least one of the words matches the password p = p=0.5 Approximate number of words in the list m =

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Current Trends In Database Technology Edbt 2006 Edbt 2006 Workshops Phd Datax Iidb Iiha Icsnw Qlqp Pim Parma And Reactivity On The Web Munich Germany March 2006 Revised Selected Papers Lncs 4254

Authors: Torsten Grust ,Hagen Hopfner ,Arantza Illarramendi ,Stefan Jablonski ,Marco Mesiti ,Sascha Muller ,Paula-Lavinia Patranjan ,Kai-Uwe Sattler ,Myra Spiliopoulou ,Jef Wijsen

2006th Edition

3540467882, 978-3540467885

More Books

Students also viewed these Databases questions

Question

What is operatiing system?

Answered: 1 week ago