Question: Computer security question.help asap 12. (12 points) Computer B requires a user name and a password for every login. User A needs to log on
Computer security question.help asap 12. (12 points) Computer B requires a user name and a password for every login. User A needs to log on over the Internet. One solution (e.g., telnet) is to send in A's user name and password to B in clear text What is the security vulnerability of this solution if there is any? Answer in 2 sentences or less. (6 points) Design a better solution. Draw a diagram only to describe the message exchanges between A and B, and the content of each message. (6 points) iorderypt megsing 5Q-bi . (10 points) Assume it takes 1ms to en secret key k algorithm. How to decrypt the message with brutal force? Calculate the amount of time required. (5 points) If the length of the key is now 100 bits, calculate the amount of time required to decrypt the message with brutal force. (5 points) Copyright Oby Shengli Yuan. All rights reserved
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
