Sei sulla pagina 1di 1

Sasin

Banpavichit 5222781486 HW1 ITS 335 IT Security 1.) From the given hash code e91e6348157868de9dd8b25c81aebfb9 the original value of this hash code can be decrypted by Google to be the word security. 2.) When we use Brute force to break the password the time required to break the password depends on the set of possible character used in the password and the speed that the PC used to go through each set of passwords. The example can be given as followed, if the speed of PC to go through each combination of passwords is 4,000,000 passwords per second and the combination of characters used are letter both upper and lower case and numbers, with the password length of 8 characters. So there are 628 possible sets of password. This gives the total time to be 628/4000000 = 54,585,026 seconds or about 632 days. The real speeds that PC can go through password are varying depending on the speed of CPU and GPU on each PC. 3.) From the calculation in previous question md5 can be a secure password depending on its length. In the calculation when the length of the password is 8 it takes almost two years to crack the password. So in my opinion the md5 can be secure if we use long enough password length and change the password often. 4.) I have read online and found out that the speed of going through each combination can be as high as 900,000,000 passwords per second. In this case using the same assumption as question 2 it will take about 3 days to crack the pass word but if the length increase to 10 characters it will take 10,793 days to crack. So I would say that 10 is an appropriate length of password.

Potrebbero piacerti anche