Purchase Solution

Client-Server system and password protection by hashing

Not what you're looking for?

Ask Custom Question

Q1 A client/server system requires remote users to use a password to log onto the server. Describe a simple scheme that would thwart eavesdroppers from obtaining and/or spoofing the password.

A1. unknown

Q2 Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

A2. The hash value of the modified file would look entirely different than the original hash value.

Q3. Invent a simple hash function. Identify its weaknesses.

A3. Unknown

V/R

Purchase this Solution

Solution Summary

Solution clearly explains about client-server systems and also explains the ways of thwarting eavesdroppers by using hash functions

Solution Preview

Hi,
I am very happy to help you with these questions.

All the best for your future.

Regards,
Leela Krishna

========================= Answer Starts =======================

Q1 A client/server system requires remote users to use a password to log onto the server. Describe a simple scheme that would thwart eavesdroppers from obtaining and/or spoofing the password.

A1. The simple scheme to thwart eavesdroppers is to ENCRYPT the password before transmission and decrypt the password on the server side.

Q2 Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file. Assuming that Bob used a strong hash function, what would the hash value of the modified file look like, as compared with the original hash value?

A2. The hash value of the modified file would look entirely different than the original hash value.
(My comment: Your answer is correct. The hash value would be different from the original hash value as Bob has used a strong

hash algorithm)

Q3. Invent a simple hash function. Identify ...

Purchase this Solution


Free BrainMass Quizzes
Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Excel Introductory Quiz

This quiz tests your knowledge of basics of MS-Excel.

C++ Operators

This quiz tests a student's knowledge about C++ operators.

Javscript Basics

Quiz on basics of javascript programming language.

C# variables and classes

This quiz contains questions about C# classes and variables.