Using JCA in Java- 5pgs due in 5hrs

Estimation of time required for brute-force search attack on the password-based encryption

(To use the attached program, do not use your own program,please)

This assignment asks you to estimate the time required for successful brute-force search attack on password-based encryption using JCA in Java. It assumes that you have done Lab 1, Lab2, Lab3 (see attachment).

Make a list of passwords, mentioned in item 3 of Section 1.2 of Lab 1 instructions (page 2)

For password-based DES encryption implementation in JCA (Lab 2 and Lab 3) fix some salt and iteration count and record an average time required for encryption/decryption (done in Lab 3);

For each of the passwords above estimate the time required for successful brute-force search attack, assuming that an attacker knows:

• the predefined plaintext;

• the ciphertext produced;

• the salt;

• the iteration count;

• but no password.

Investigate how the time required for the attack depends on the iteration count;

Consider a variant of the attack, in which an attacker knows everything as above, except the iteration count, and estimate the time required to recover the passwords;

Compare your estimated time with the estimated time returned for the same passwords by online services (Lab 1, page 2) and propose plausible explanation of any observed differences.

Write a report on the above, providing an evidence for your arguments (e.g. snippets of code used to estimate time required for one encryption).

computing

 
File submission: Final project – Project-based learning 

 
Objective of the activity  Through this project the student will demonstrate the mastery of skills in the use of productivity applications MS Word 2016, MS Power Point 2016 and MS Excel 2016. 

 

Instructions

Access the following link. final project.docxPreview the document

 
Deliverable  The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). 

 
Activity value   82 points 

 
Basic review resources  Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages WD433 –WD676 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages PPT409 – PPT647 Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages EX433 – EX684 Tutorials for modules III – VIII Supplemental review resources  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b (Links to an external site.) Universia Colombia. Retrieved from https://noticias.universia.net.co/en-portada/noticia/2015/03/13/1121434/9-consejos-buena-presentacion-power-point.html 

Giving useful direction: How to make cheesy baked mussels ?

My approved idea: 

Have you ever tried cheesy baked mussels at restaurants and wondered how they make it? 

Cheesy baked mussels dish is a juicy and tasty seafood appetizer and of course, you can easily make it at home without any cooking experience. 

I always use frozen mussels so I highly recommend using frozen mussels instead of fresh mussels since frozen mussels already come in half-shells, ready to use after thawing, and easy to find at any supermarket. The rest of the ingredients; mayonnaise, Cheddar cheese, oyster sauce, lime juice, and green onion; might be available in your kitchen or you can easily buy it. We also need to have an oven, any size, or an air fryer to bake. 

1. Write your completed directions.

  • Your directions must be written step-by-step directions. You cannot use images or diagrams, or direct people to other sets of directions. You must describe everything the reader needs to make sense of the task.
  • The directions should be between 1-3 pages in length, but you are not graded on length.
  • Use spacing and layout to help the reader. Do not just make a numbered list in Microsoft Word. Add titles and subtitles, group related steps, etc.
  • You will be graded on the quality of your directions. They should be clear, logical, and grammatical.

Notes on this assignment:

  • Do not plagiarize. The point of this assignment is for you to practice breaking a task into step-by-step components. Copying from another guide (either structure or phrases) is cheating, so don’t do it or you’ll get a 0 and be reported to the academic integrity office.
  • Recipes are a good example of these kinds of directions, as are how-to manuals. Examples: Google Earth, (Links to an external site.) Adobe Photoshop CC (Links to an external site.)
  • Bad directions merely give the “correct” way to do the task. Good directions help the users understand the task better and be able to make better choices. For example, bad directions simply give some options without explaining why one might choose them, or tell the user what to do without explaining why they need to do things in that way. Another way to say this is that bad directions merely help a user do a task, good directions help them understand a task.

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

 

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.  Make your initial post by Thursday 11:59 pm EST. Respond to two of your classmates by Sunday 11:59 pm EST.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

OR_Discussion_2

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

Health information threats

Evaluate three threats to health information systems and explain their impact on patient health information.

Minimum 400 words with 3 scholarly references

COMPUTER SECURITY_week10

Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall.

In 400 words

Strategic Management

Read the attached case study answer the questions at the end of the text in a 2 and a half page paper (excluding title and reference pages) include at least three peer-reviewed sources found.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition.