Question: Countermeasures - In general, protection against attacks on authentication systems consists of: Hiding information related to a , c , or f . Preventing access
Countermeasures
In general, protection against attacks on authentication systems
consists of:
Hiding information related to or
Preventing access to the authentication functions linL.
In particular, protection against dictionary attacks consist of
maximizing the time needed to guess the password.
The probability that a dictionary attack succeeds in a specified time period is
expressed as:
Where:
P is the probability that the attack succeeds
is the time period during which the attack takes place
is the total number of possible passwords
is the number of guesses that can be tested in one time unit
Assignment
Marks:
Description: A bank requires for their customers to access their online banking accounts to provide as User Id or username the last digits of their bank card number, and a password with a length between and ASCII characters, including the following restrictions:
Password must:
Have at least characters
Have at least letter a b c
Have at least number
Include both Upper case and Lower case characters
Password must NOT:
Contain only one character or aaaaaaa
Contain only consecutive characters or abcdefgh
The bank also requires that each password be changed at least once every five years.
Assume that by conducting the attack using an average modern GPU passwords can be tested per second, calculate the probability that a hacker can guess a password in the timeframe between two consecutive changes.
A hacker controls a network of compromised machines botnet that can be used to launch the attack. The network consists of million compromised machines bots located in different countries around the globe. Assume that the machines have approximately the same computing capability. The hacker uses a simple strategy consisting of slicing the username space in subsets of equal size, and assigning a subset to each of the bots to conduct the attack in parallel. Calculate the probability that a successful password guess can be obtained in the timeframe between two consecutive changes. Briefly comment the results.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
