1uppose the password file of a system is available to a


1. Suppose the password file of a system is available to a cracker. How much extra time does the cracker need to crack all passwords if the system is using the Morris-Thomp- son protection scheme with n-bit salt versus if the system is not using this scheme?

2. Name three characteristics that a good biometric indicator must have in order to be useful as a login authenticator.

3. Authentication mechanisms are divided into three categories: Something the user knows, something the user has, and something the user is. Imagine an authentication system that uses a combination of these three categories. For example, it first asks the user to enter a login and password, then insert a plastic card (with magnetic strip) and enter a PIN, and finally provide fingerprints. Can you think of two drawbacks of this design?

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: 1uppose the password file of a system is available to a
Reference No:- TGS01278590

Expected delivery within 24 Hours