Computer Security 2
Computer Security 2
This concerns the basic requirements for Authentiaction and Access Control.
1. The police and the public defender share a computer. What security problems does this
present? Do you feel that it is a reasonable cost-saving measure to have all public agencies
share the same (set of) computers?
2. A respected computer scientist has said that no computer can ever be made perfectly secure.
Why might she have said this?
3. Assume that passwords have length six and that all alphanumerical characters, upper and
lower case, can be used in their construction. How long will a brute force attack take on
average if:
4. Assume that you are only allowed to use the 26 characters from the alphabet to construct
passwords of length n. Assume further that you are using the same password in two systems
A, B, where system A accepts case sensitive passwords but system B does not.
(a) How many attempts (worst case) are required to guess a password of system A (case
sensitive).
(b) How many attempts (worst case) are required to guess a password of system B (not case
sensitive).
(c) Suppose a hacker has succeeded in guessing your password in system B (not case sensi-
tive). How many attempts (worst case) are required by the hacker to guess your password
of system A (case sensitive).
Mike Burmester