Question: Computer security question.help asap 12. (12 points) Computer B requires a user name and a password for every login. User A needs to log on

 Computer security question.help asap 12. (12 points) Computer B requires a Computer security question.help asap

12. (12 points) Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution (e.g., telnet) is to send in A's user name and password to B in clear text What is the security vulnerability of this solution if there is any? Answer in 2 sentences or less. (6 points) Design a better solution. Draw a diagram only to describe the message exchanges between A and B, and the content of each message. (6 points) iorderypt megsing 5Q-bi . (10 points) Assume it takes 1ms to en secret key k algorithm. How to decrypt the message with brutal force? Calculate the amount of time required. (5 points) If the length of the key is now 100 bits, calculate the amount of time required to decrypt the message with brutal force. (5 points) Copyright Oby Shengli Yuan. All rights reserved

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!