1.Suppose we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message. Further suppose an intruder, Trudy, can eavesdrop and detect that Bob crashed (maybe Trudy can even cause Bob to crash). This would create a situation where Trudy has Alice's reply (which Bob did not receive) and which Trudy can use to impersonate Alice, assuming Trudy logs in before Alice attempts to log into Bob again. How can we modify Bob's behaviour to prevent this threat, and exactly when would we overwrite Bob's database, and with what?© BrainMass Inc. brainmass.com October 24, 2018, 6:11 pm ad1c9bdddf
Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.
The server stores for each user
1. the user name,
2. an integer n,
3. the n-fold hash of the password: hashn(password).
If the user wants to log on, the user types in the password. Her machine sends a request to the server, which answers with a prompt for n. The user's machine calculates hashn-1(password) and sends this to the server. The server calculates hash(hashn-1(password)) = hashn(password). If this value matches the one ...
Network crashes are hypothesized.
Operations Management: Candidates for crashing on a CPM network
Two critical path activities are candidates for crashing on a CPM network. Activity details are in the table below.
Normal Time: 8 days
Normal Cost: $6,000
Crash Time: 6 days
Crash Cost $6,800
Normal Time: 10 days
Normal Cost: $4,000
Crash Time: 9 days
Crash Cost: $5,000
To cut one day from the project's duration, activity _____ should be crashed first, adding_______ to projects cost.View Full Posting Details