A password is considered strong if the below conditions are all met: • It has at least 6 characters and at most 20 characters. • It contains at least one lowercase letter, at least one uppercase letter, and at least one digit. • It does not contain three repeating characters in a row (Le., "...aaa..." is weak, but "..aa..a..." is strong, assuming other conditions are met). Given a string password, return the minimum number of steps required to make password strong. if password is already strong, return e. In one step, you can: • Insert one character to password, • Delete one character from password, or • Replace one character of password with another character. Example 1: Input: password - Output: 5
Q: Encrypt the message ''DO NOT PASS GO Use the following encryption function f(p)=(p+13)mod26
A: Be ready with this chart to assist you while you encrypt The numbers for the respective characters…
Q: Cryptanalysis Given the ciphertext OENCGVGDUTEKRECARILIELORPSYNAOSKLASTTPMXALPHEIIXNOEENNCX,…
A: Given ciphertext is, OENCGVGDUTEKRECARILIELORPSYNAOSKLASTTPMXALPHEIIXNOEENNCX If we carefully…
Q: Create a symmetic encryption scheme and show the ciphertext for the work 'HELLO'.
A: Symmetric Encryption: Symmetric encryption or shared key encryption is a method of encryption where…
Q: The Caesar Cipher Algorithm was introduced in Week #1. Encryption is the act of encoding a message…
A: # Caesar Cipher Encryption function def caesar_cipher_encrypt(text, key, a): text = text.upper()…
Q: Select the most correct statement: A. Diffusion hides the relationship between the key and…
A: The answer is option B: Confusion hides the relationship between the key and ciphertext. Confusion…
Q: A5. In the following scheme: D) M M E Е(PRa, M) PUa PRa a. Both Confidentiality and Authentication…
A: We are given a situation where data is encrypted with the private key and then it is decrypted with…
Q: is: 045, then middle digit = 4 and last two digit= 45}. Compute the public key
A: Q. Let p = 23, q = 47, g = 2, H(M) = 2. Let x= last two digits of roll no and k = middle digit of…
Q: 4. An encryption scheme is unconditionally secure if the ciphertext generated does not contain…
A: Question 4. An encryption scheme is unconditionally secure if the ciphertext generated does not…
Q: Write introductory paragraphs on computer virus and online course. Be sure your method suits your…
A:
Q: A password consists of 4 to 6 digits can be chosen from the available 10 digits with repetitions…
A: here in the given question 10 digit are given and with repetation how many password is possible that…
Q: If the cost of breaking the cipher exceeds the value of the encrypted information. The time required…
A: The scheme is referred to as Computationally secure if any one of the following criteria is met If…
Q: mark the correct alternative that corresponds to the Hash cryptographic system definition
A: This is very simple. Firstly let's understand what is a Hash Cryptography. Hash cryptography is…
Q: When is an encryption algorithm considered computationally secure? a. An encryption algorithm is…
A: To find when is an encryption algorithm computationally secure
Q: Explain the suitability or unsuitability of the following passwords: • d. Washington • e. Aristotle…
A: WashingtonUnsuitable:- The given password is the name of the place which is easily guessable. It…
Q: The encryption process can be performed using two basic types of encryption/decryption: symmetric…
A: Encryption is process of Encoding of data. Decryption is Process of Decoding of Data. Symmetric…
Q: 7. A 0/1 knapsack can carry a maximum weight of 60. There are 4 items with weights {20, 30, 40, 70}…
A: Given а set оf items, eасh with а weight аnd а vаlue.Knарsасk аlgоrithm determine the…
Q: Encryption is the process of transforming a message, called plain text, into ______ text. which…
A: Encryption is basically the process in which the message that is in plaintext form is…
Q: ate the corresponding private key: a =? d) Write the expressions for encryption and decryption…
A: RSA algorithm:- This given RSA algorithm is one of the initial cryptosystem that remain most…
Q: In a computing system, a password consists of 6 characters. Each character can be an uppercas…
A: Answer
Q: How should you protect yourself in the case that you are subjected to an attack of a lower rank?
A: Introduction: Downgrade attack: This is a form of cryptography attack against a computer system or…
Q: Which of the principle of security is violated
A: The principle of security is violated
Q: JANANI N 21MIC0076 Bank Incentive PolicyVirtual programming lab O Due date: Wednesday, 6 October…
A: 1) Below is python program to calculate the bonus based on balance and gender of all deposit holder…
Q: A software is used to calculate the number of integers ranging from 1 to 10. The software is…
A: Security Analyst: examines available tools and countermeasures to correct identified vulnerabilities…
Q: Password must be 8 characters long. Can be comprised of any arrangement of numbers and letters. How…
A: Password must be 8 characters long. Can be comprised of any arrangement of numbers and letters. How…
Q: If the cipher text generated by the scheme does not contain enough information to determine uniquely…
A: Answer : An Unconditional secure is the scheme which is used if any cipher text not contain enough…
Q: The number of the integers from 1 to 10 is computed using a programme. The software is written by a…
A: Answer is given as
Q: The Caesar Cipher Algorithm was introduced in Week #1. Encryption is the act of encoding a message…
A: Python code is as follows:-
Q: Bank Incentive PolicyVirtual programming lab A Due date: Wednesday, 6 October 2021, 10:00 AM A…
A: Q: Code the given problem
Q: 10. The most secure password is A. John B. 2 johnll C. *Johnll D. Johnll
A: Sol 10: Characteristics for the secure password: The minimum length of the password is 8 and the…
Q: The entry(E) for medical staff in to the Cardiac Care Unit (CCU) has some restrictions. Only staff…
A: a. identity the input and output variable are : Input Variables are: mask(K) gloves(L)…
Q: Write a program about password cracking. The password file should contain 6-digit numbers only (from…
A: python program about password cracking
Q: a. As a user, you may have come across systems with antivirus installed on them yet the same…
A: Answer (a) : Malware infection occurs when malware, or malicious software, infiltrates your…
Q: Two new computer codes are being developed to prevent unauthorized access to classified information.…
A: 1) Code1 is the better code for preventing unauthorized access! Explanation- Because the probability…
Q: A strong password has following properties. i. It MUST start with Capital Letter. ii. Must have at…
A: A Regular Expression or Regex is a sequence of characters which forms patterns, mostly using in…
Q: A password is considered strong if the below conditions are all met: It has at least 6 characters…
A: Please find the solution in the below step
Q: A secure conversation should be private. In other words, only the sender and the receiver should be…
A: Answer: In an insecure communication route, public key cryptography would be a superior alternative…
Q: Cryptanalysis is the science of recovering the plain text x from the cipher text y or recovering the…
A: Cryptanalysis is the science of recovering the plain text x from the ciphertext y or recovering the…
Q: Computer Security Project 3 AIM: Write the program that encrypts and decrypts a given message using…
A: Install the requirements in python - !pip install pycryptodomex Code - #import the packages…
Q: A SAF authorization form is used in most universities to approve funding for students to aid their…
A: ANSWER:-
Q: 2. Cryptanalyze the given ciphertext which was obtained via the Vigenere cipher. Determine the…
A: I am providing the code of Vigenere Cipher for your reference, so you can put in it encrypted text…
Q: FINAL FAILURE IS NOT FATAL" and the cipher text "INEEIJJZBJTNZDXEKAMPRETWKMYSRMRVUBS WESTZ". Find…
A:
Q: Write a short code of ethics for university students concerning the plagiarism issue only to help…
A: I Have answered this question in step 2.
Q: A cryptographic process that uses the same key for the encryption and decryption operations is…
A: 1)Symmetric encryption 2) AES 3)Plain Text 4)Alice Private Key 5)Stream ciphers 6)RSA 7)Decryption…
Q: Question 1: The English alphabet contains 21 consonants and five vowels. Determine the number of…
A: ANSWE The English alphabet contains 21 consonants and five vowels. Determine the number of strings…
Q: The entry(E) for medical staff in to the Cardiac Care Unit (CCU) has some restrictions. Only staff…
A: “Since you have posted a question with multiple sub-parts, we will solve first three sub-parts for…
Q: CSC 385 –Assignment 4 –Faster SortingAlgorithms .This problem is taken from a hackerrank programming…
A: HackerLand National Bank has a easy policy for warning customers approximately possible fraudulent…
Q: Assume we use transposition cipher to encrypt the data, and the original message is stored in a 8 by…
A: Answer:)
Q: 1. Which of the following statements are incorrect? A. Cryptographic systems tend to involve both…
A: Answer 1: Cryptographic systems work including both an algorithm to hide the information and a…
Computer Engineering Lab
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Python Knapsack Problem: imagine you are carrying a knapsack with capacity to hold a total of weight C. You are selecting among n items with values A={a_1, a_2, ... , a_n} and associated weights W={w_1, w_2, ... , w_n}. Here the weights and values are all positive. You wish to maximize the total value of the items you select not exceeding the given weight capacity, example, maximize sum_{a in A} such that sum_{w in W} <= C. Note that you can only select your items once. Reformulate this as a bottom-up dynamic programming problem as follows. Define K_{i,j} as the highest possible value sum considering items 1 through i and total weight capacity j (j <= C). What is the base case i.e. K_{0,j} for all j and K_{i,0} for all i. What is the loop statement?An algorithm that validates username and pass- word. Here’s what the algorithm can do:(10pts) •The user has 3 chances, if username and password matches, display logged in, else, display account locked. • Assume that there is a list of username and their corresponding password. Each time the user enters a wrong credential, it should display what goes wrong(i.e. User does not exist, or Incorrect password)Question 3 Students are required to create 5-character long passwords to access the library. The letters must be from lowercase letters or digits. Each password must start with a lowercase letter and end with a digit and contain at most 2 digits. How many valid passwords are there? Question 4 منهم 0 a) Give an example of a string that is accepted by this automaton. b) Give an example of a string that is rejected by this automaton. c) Describe the language of this automaton.
- Task One. Implementation of Trapdoor Knapsack En- cryption Scheme In this section, you are to implement a trapdoor knapsack encryption scheme. When the program is run, it first asks for the size of the super-increasing knapsack, then the user is asked to enter the value of each a; in the private key. Then, the user is asked to enter a modulus, follows by a multiplier. You will need to check whether condition of the multipllier is satisfied. Then, the public key will be generated and shown. Now, a set of message is being asked, and the ciphertext will need to be displayed. Finally, a ciphertext will need to be asked and the correct decryption of the ciphertext will need to be displayed. Implement this part as knapsack.cpp or knapsack.javaA deck of cards contains 52 cards with four suits: club, diamond, heart and spade ranging in values from 2, ... to 10, Jack, Queen, King and Ace. Ace has the highest value in the same suit. Cards can be compared using their face values. A card with higher face value is bigger than a card with lower face value. If two cards have the same face value, then the suit determines the order. Club is smaller than diamond which is smaller than heart which is smaller than spade. For example: club 2 < diamond 2 < heart 2 < spade 2 if compared.Write an interactive Java program that allows you play cards with a computer. For this project, we are going to focus on one suit of the deck of cards. There are only 13 cards (value: 2, ... to 10, Jack, Queen, King and Ace) in a suit. To play:(a). You first pick a suit at random from the four suits (club, diamond, heart and spade), and display the suit. (b) Then you randomly draw a card from the suit, and let computer draw a card from the same…Python Knapsack: you are carrying a knapsack with capacity to hold a total of weight C. You are selecting among n items with values A={a1, a2, ... , an} and associated weights W={w1, w2, ... , wn}. Here the weights and values are all positive. You wish to maximize the total value of the items you select not exceeding the given weight capacity, example, maximize sum_{a in A} such that sum_{w in W} <= C. Note that you can only select your items once. In Python, create function DP_K (C, A, W) as stated above. Input an array to the function to hold the backtrace. What is the best set of items for C = 30, A = [40, 110, 100] and w = [20, 30, 40]? This can be shown using auxiliary printing function.
- A deck of cards contains 52 cards with four suits: club, diamond, heart and spade ranging in values from 2, ... to 10, Jack, Queen, King and Ace. Ace has the highest value in the same suit. Cards can be compared using the face value. A card with higher face value is bigger than a card with lower face value. If two cards have the same face value, then the suit determines the order. Club is smaller than diamond which is smaller than heart which is smaller than spade. For example: club 2 < diamond 2 < heart 2 < spade 2 if compared. Write an interactive Java program that allows a user to randomly pick a card from the deck of 52 cards (using a random number between 1 and 4 to represent the four suits: club, diamond, heart and spade and then another random number to represent the face value) to play. Show the suit and face value of the user card. Then the program acts as a card dealer which randomly draws another card and displays the card (again showing the suit and face value of…3. A safe is locked by a combination of of four binary digits (that is, 0 or 1), but the owner has forgotten the combination. The safe is designed in such a way that no matter how many digits have been pressed, if the correct combination of three digits is pressed at any point, then the safe automatically opens (there is no "enter" key). Our goal is to find the minimum number of digits that one needs to key in in order to guarantee that the safe opens. In other words, we wish to find the smallest possible length of a binary sequence containing every four-digit sequence in it. (a) Create a digraph whose vertex set consists of three-digit binary sequences. From each vertex labelled ryz, there is one outgoing edge (labelled 0) leading to vertex yz0, and another outgoing edge (labelled 1) leading to vertex yz1l. (b) Explain why every edge represents a four digit sequence and why an Eulerian tour of this graph represents the desired sequence of keystrokes. (c) Find the minimum number of…Lucky Pairs Richie and Raechal are participating in a game called "Lucky pairs" at the Annual Game Fair in their Company. As per the rules of the contest, two members form a team and Richie initially has the number A and Raechal has the number B.There are a total of N turns in the game, and Richie and Raechal alternatively take turns. In each turn, the player's number is multiplied by 2. Richie has the first turn. Suppose after the entire N turns, Richie’s number has become C, and Raechal’s number has become D, the final score of the team will be the sum of the scores (C+D) of both the players after N turns. Write a program to facilitate the quiz organizers to find the final scores of the team. Input and Output Format:The only line of input contains 3 integers A, B, and N.Output a single line that contains the integer that gives the final score of the team which will be the sum of the scores of both the players after N turns.Refer sample input and output for formatting specifications.…
- 1. Suppose that a bank only permits passwords that are strings from the alphabets = {a,b.c, d, 1, 2, 3, 4). The passwords follow the rules (a) The length can be 5 or more. (b) The first alphabet must be from {a,b,c,d}. (c) The last two alphabets must be from {1,2,3,4} Give a regular expression for this language.UML Design for Turing Machine Description: An electro-mechanical device used by the British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. A Turing Machine is a very simple abstract model of computation. The machine has an infinite tape that is divided into cells (or squares). Each cell contains a symbol (or character) chosen from some small set of possible symbols. Most of the cells are blank, that is, they contain the blank symbol. The number of non-blank cells is finite. The machine is located on one of the cells, and it can only "see" the symbol in the cell where it is located. It can write a new value to that cell. It can move left or right on the tape, one cell at a time. The machine is in one of a fixed, finite number of possible states. One of the states is the halt state. A Turing Machine has a table of rules. The table of rules is the program for the machine. A rule tells the machine what action to take when it is in a…Rent-a-Car is a car rental company with a large fleet of cars and it offersshort term rentalto both individual and corporate customers. To rent a car, a customer mustbe registered. If the customer is an individual, the customer name, an emailand a contact number arerequired. If the customer is a corporate customer, the company registrationnumber, the year it isestablished, email addressand a contact numbermust be supplied. If customerregistration is unsuccessful, the customer data is not recorded. Otherwise, a customer ID is generated.Individual customersthen need to supply credit card information which includes card holder name, card number,date of issue, expirydate and security code before any rental can be made. If the customer is corporate, an accountis createdfor payment purpose. The account is identified by account numberandit recordsthe outstanding balance. Arentalrequestcan be made not more than 3 months in advance. To rent, acustomer selectsa collection dateand time, a return…