首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
代写CSCI262、C/C++, Java,Python编程代做
项目预算:
开发周期:
发布时间:
要求地区:
School of Computing & Information Technology
CSCI262 System Security
SIM-2022-S4
Assignment 1 (14 marks, worth 14%)
Due date: 5 November 2023, 20:55 (SG Time).
Part One: Short answer questions: 4 Marks
1. Determine the entropy associated with the following method of generating a password. 1 Mark
Choose, and place in this order, one lower case letter, following by one upper case letter,
followed by two digits, followed by @, followed by two letters, each upper or lower case,
and then followed by three symbols drawn from the set {$, 9,5, 𝑣, 𝑤,𝐽}. Finally, apply the
hash function Tiger to give an output string in hex which will be used as a password.
What is the entropy of the password? Is the entropy of the password increase after applying the
hash function? How about the strength or complexity of the password? Justify your answer.
Assume random choices are made with equal likelihood of each symbol from the space being chosen
from. So for a random digit there are 10 possibilities, each chosen with probability 1/10.
2. Generate a BLP lattice–structured system where the objects and subjects are appropriately levelled to
give access consistent with the access control matrix below. You need to describe the process by
which you obtain your lattice. R and W correspond, respectively, to read and append. You are to use
only the mandatory BLP rules, and a default allow in place of the discretionary rule. Be sure to add a
level as necssary to ensure this is a lattice. 2 Mark
3. For the following collection of statements, describe the sets of actions, objects, and subjects; and
draw an access control matrix to represent the scenario. 1 Mark
2
Alice can climb trees and eat apples.
Bob can climb fences, eat apples, and wave flags.
Trees can hurt apples.
Carol can jump waves and wave flags.
Part Two: Implementing a rainbow table 10 Marks
You are to write a program, in C/C++, Java or Python, that should run using the following instruction:
$ ./Rainbow Passwords.txt
where the file Passwords.txt contains a list of possible passwords. The password file contains a password
per line, as in the provided words file and consists of strings of printable characters. Any password used
must be taken from this file, so the only stored hash information needs to relate to those entries in the file.
The program is used to find pre–images for given hash values. Rainbow tables can be used to solve
pre–image problems for hash functions. At the simplest level they can simply be a list of hash values
and the corresponding pre-images, often from some dictionary. This can be expensive in terms of storage
space however, and a more efficient way of identifying pre-images involves the use of the hash function
and reduction functions.
First step (5 marks): Your program will do some initial computations to generate the rainbow table.
The process is as follows:
1. Read in the list of possible passwords. Report on the number of words read in. (0.5 mark)
2. For each previously unused word W, first mark it as used and then carry out the following process
(3 marks):
(a) Apply the hash function H to the word W to produce a hash value H(W ), which we refer to
as the current hash.
(b) Apply the reduction function R to the current hash, which will give a different possible password
which should be marked as used and then hashed. The resulting hash value is recorded as the
current hash.
(c) Repeat the previous step five times. You can deal with collisions if you like but are not required
to.
(d) Store the original word W and the final current hash as an entry in your rainbow table.
3. To assist with the later identification of the pre–images you should sort the rainbow table based on
the hash values (0.5 mark).
4. Output the list of words and corresponding "final current hashes" to a text file Rainbow.txt. Report
to standard out the number of lines in your rainbow table (1 mark).
Second Step (5 marks): You are now ready to carry out the second part of the exercise, finding pre-images.
Request a hash value from the user. There should be appropriate error checking as to the length of the input
string etc. The process of identifying the pre-image for the provided hash value is sketched as follows:
1. Check if the hash value is in the rainbow table (1 mark).
2. If the hash value isn't in the rainbow table you reduce and hash until you get a hash value that is in the
rainbow table, or until you have done the reduce and hash enough times that it's clear from the way the
rainbow table is generated that something is wrong. Display an appropriate message if this happens (2
mark).
3. Once you have identified the relevant hash value in the table you take the corresponding password and
hash it. If that is your hash value, you have your pre-image. If it isn't, then reduce and hash again, until
the reduced word hashes to the hash value being searched for (1 mark).
4. Output the relative reduced word, that is your pre-image (1 mark).
A reduction function is designed to take a valid hash value and return a valid password, in this case a valid word
from Passwords.txt. The reduction function to be used should be based on the number of words in the
Passwords.txt file, and since that isn't a fixed length file your method needs to be dynamic. You should find a
way to convert a hash value to an integer that identifies one of the passwords. You can define yourself a
reduction function R or find some examples online. You should describe how your reduction function works in
readme.txt. You should use MD5 as the hash function. You don't need to implement the MD5 hash function by
yourself. You can find such a file online. Provide a reference if you use any open-source implementation.
1. Submission is via Moodle.
2. Include the compilation instructions with your submission in a file readme.txt. That file should also contain a
description of how you do the reduction. If no such file exists in your submission, then you will get zero for
this Part two.
3. Late submissions will be marked with a 25% deduction for each day, including days over the weekend.
4. Submissions more than three days late will not be marked unless an extension has been granted.
5. If you need an extension apply through SOLS, if possible before the assignment deadline.
6. Plagiarism is treated seriously. Students involved will receive zero.
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代写dts207tc、sql编程语言代做
2024-12-25
cs209a代做、java程序设计代写
2024-12-25
cs305程序代做、代写python程序...
2024-12-25
代写csc1001、代做python设计程...
2024-12-24
代写practice test preparatio...
2024-12-24
代写bre2031 – environmental...
2024-12-24
代写ece5550: applied kalman ...
2024-12-24
代做conmgnt 7049 – measurem...
2024-12-24
代写ece3700j introduction to...
2024-12-24
代做adad9311 designing the e...
2024-12-24
代做comp5618 - applied cyber...
2024-12-24
代做ece5550: applied kalman ...
2024-12-24
代做cp1402 assignment - netw...
2024-12-24
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!