You are to write a program, in C/C++ or Java, that compiles on Banshee with an...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
You are to write a program, in C/C++ or Java, that compiles on Banshee with an instruction you provide in a file readme.txt. Your program should run on Banshee using the following instruction: $ ./Rainbow Passwords.txt where the file Passwords.txt contains a list of possible passwords. The password file contains a password per line, as in /usr/dict/words and consists of strings of printable characters. Any password used must be taken from this file, so the only stored hash information needs to relate to those entries in the file. The program is used to find pre-images for given hash values. Rainbow tables can be used to solve pre-image problems for hash functions. At the simplest level they can simply be a list of hash values and the corresponding pre-images, often from some dictionary. This can be expensive in terms of storage space however, and a more efficient way of identifying pre-images involves the use of the hash function and reduction functions. Your program will do some initial computations to generate the rainbow table. The process is as follows: 1. Read in the list of possible passwords. Report on the number of words read in. 2. For each previously unused word W, first mark it as used and then carry out the following process: (a) Apply the hash function H to the word W to produce a hash value H (W), which we refer to as the current hash. (b) Apply the reduction function R to the current hash, which will give a different possible password which should be marked as used and then hashed. The resulting hash value is recorded as the current hash. (c) Repeat the previous step four times. You can deal with collisions if you like but are not required to. (d) Store the original word W and the final current hash as an entry in your rainbow table. 3. To assist with the later identification of the pre-images you should sort the rainbow table based on the hash values. 4. Output the list of words and corresponding "final current hashes" to a text file Rainbow.txt. Report to standard out the number of lines in your rainbow table. You are to write a program, in C/C++ or Java, that compiles on Banshee with an instruction you provide in a file readme.txt. Your program should run on Banshee using the following instruction: $ ./Rainbow Passwords.txt where the file Passwords.txt contains a list of possible passwords. The password file contains a password per line, as in /usr/dict/words and consists of strings of printable characters. Any password used must be taken from this file, so the only stored hash information needs to relate to those entries in the file. The program is used to find pre-images for given hash values. Rainbow tables can be used to solve pre-image problems for hash functions. At the simplest level they can simply be a list of hash values and the corresponding pre-images, often from some dictionary. This can be expensive in terms of storage space however, and a more efficient way of identifying pre-images involves the use of the hash function and reduction functions. Your program will do some initial computations to generate the rainbow table. The process is as follows: 1. Read in the list of possible passwords. Report on the number of words read in. 2. For each previously unused word W, first mark it as used and then carry out the following process: (a) Apply the hash function H to the word W to produce a hash value H (W), which we refer to as the current hash. (b) Apply the reduction function R to the current hash, which will give a different possible password which should be marked as used and then hashed. The resulting hash value is recorded as the current hash. (c) Repeat the previous step four times. You can deal with collisions if you like but are not required to. (d) Store the original word W and the final current hash as an entry in your rainbow table. 3. To assist with the later identification of the pre-images you should sort the rainbow table based on the hash values. 4. Output the list of words and corresponding "final current hashes" to a text file Rainbow.txt. Report to standard out the number of lines in your rainbow table.
Expert Answer:
Answer rating: 100% (QA)
A rainbow table which refers to an efficient way used to store data that has been computed and in ad... View the full answer
Related Book For
Posted Date:
Students also viewed these programming questions
-
On January 1, Year 2, PAT Ltd. acquired 90% of SAT Inc. when SATs retained earnings were $900,000. There was no acquisition differential. PAT accounts for its investment under the cost method. SAT...
-
Apollo astronauts took a "nine iron" to the Moon and hit a golf ball about 180 m. Assuming that the swing, launch angle, and so on, were the same as on Earth where the same astronaut could hit it...
-
Separate samples of a solution of an unknown soluble ionic compound are treated with KCl, Na 2 SO 4 , and NaOH. A precipitate forms only when Na 2 SO 4 is added. Which cations could be present in the...
-
Repeat Example 7.3 using \(10 \mathrm{~kg} / \mathrm{h}\) of solvent in each stage. Data From Example 7.3:- The feed of Example 7.2 is extracted three times with pure chloroform at 298 K, using 8...
-
The following data relate to the operations of Shilow Company, a wholesale distributor of consumer goods: (a) The gross margin in 25% of sales (b) Actual and budgeted sales data: (c) Sales are 60%...
-
Activity 3 Response: As an investigation of scientific question B, consider an object that is not the human body, but that also has a consistently higher temperature than the environment. Based on...
-
Ashton and Melody Webb are a married couple in their mid-20s. Ashton has a good start as an electrical engineer and Melody works as a sales representative. Since their marriage four years ago, Ashton...
-
1. Assume that Damon decides to start a party-planning business: a. Identify two ways he could assess the cost of goods or services sold for this business. b. Which costs, described in the case, will...
-
After reading Diagramming and Evaluating Arguments read"Social Media: Establishing Criteria for Law Enforcement"...
-
In 2026 the patent is sold to somIn 2026 the patent is sold to some third party. In the elimination entries related to this intercompany sale, what accounte third party. In the elimination entries...
-
MEDIA LAW USE RELAVANT SOUTH AFRICAN LAW TO ANSWER USE ALSO CASE LAW TO SUPPORT THE ANSWER Mr Phila Dyasi is a young vibrant brand promoter. While lecturing a Media law class at Fort Hare. During...
-
Alpha Company (Alpha) owns 42% of the voting shares of Bet Ltd. (Bet). Another individual shareholder, Joe, owns 15% of the voting shares of Bet and the remaining voting shares are owned by Number...
-
Taking HCF as an example, how to better understand separately the format and content of the balance sheet, the statement of operations, the statement of changes in net assets, and the statement of...
-
The cell reaction for the Zn- H, cell is Zn(s)+ 2H* (aq) Zn* (aq) +H, (g). Standard cell potential is +0.76 V and the cell potential at 298K is 0.45 V. Calculate the pH of the cell if [Zn**]=1.0 M...
-
Identify the tax issues or problems suggested by the following situations. State each issue as a question. Jennifer did not file a tax return for 2007 because she honestly believed that no tax was...
-
Donner Company began its operations in September of the current year. During September, the company paid wages of $23,400. For the last quarter of the year, the taxable wages paid amounted to...
-
Applebaum Security Company is located in State H, which enables employers to reduce their contribution rates under the experience-rating system. From 2002 to 2011, inclusive, the companys total...
-
What conditions exclude sick pay from the definition of wages for FICA tax purposes?
-
Show that the quantum-mechanical partition function of a system of \(N\) interacting particles approaches the classical form \[Q_{N}(V, T)=\frac{1}{N ! h^{3 N}} \int e^{-\beta E(\boldsymbol{q},...
-
Show that the entropy of an ideal gas in thermal equilibrium is given by the formula \[ S=k \sum_{\varepsilon}\left[\left\langle n_{\varepsilon}+1ightangle \ln \left\langle...
-
Show that the root-mean-square deviation in the molecular energy \(\varepsilon\), in a system obeying Maxwell-Boltzmann distribution, is \(\sqrt{ }(2 / 3)\) times the mean molecular energy...
Study smarter with the SolutionInn App