Professional Documents
Culture Documents
Chapter 9 Answers
Chapter 9 Answers
Task 9.01
1 To be secure, the password should contain upper and lower case characters, a number and a symbol.
2 There are 128 ASCII characters, of which 96 are graphic characters. The number of different passwords is
therefore 968, which is about 7 × 1015. In words this is about seven million billion.
3 If a password could be tested every second, the time taken to test every possibility in years would be this
value divided by 3600 then divided by 24 then divided by 365. The result is still a very large number. To
reduce the time to less than a year, the password would have to be tested every nanosecond. Clearly the
password is secure from this type of attack.
Question 9.02
The following would be the eight bytes that include the original seven, with the parity bit set for even parity and
byte 8 created from a parity bit for each column with even parity.
Byte 1 0 1 0 0 1 0 0 0
Byte 2 1 1 0 0 0 1 0 1
Byte 3 0 1 1 1 0 0 1 0
Byte 4 0 1 1 0 0 0 1 1
Byte 5 1 0 1 0 1 1 0 0
Byte 6 0 1 0 1 0 1 0 1
Byte 7 1 0 1 1 0 0 1 0
Byte 8 1 1 0 1 0 1 1 1
Each of the columns needs to be checked. For each of these, the parity is correct, assuming even parity. This
would indicate that the transmission has taken place with no error. However, checking the rows reveals that two
have odd parity (indicated by the x) while the remaining five data bytes and the last (parity) byte have even
parity. This would indicate that the process of setting the parity bits at the transmitting end has been in error.
b The only option is to ask for re-transmission of the data.
Exam-style Questions
1 a i Accuracy (1)
ii Validation concerns checking that the data is of the right type (1) and format (1), whereas verification
is checking data that has been input (1).
iii Any from the coursebook list (1) with a sensible example (1).
iv It is possible to enter data with the correct format and of the correct type (1) but it can still be
incorrect (1).
b 1 mark each for any of the following. (max 2)
Unauthorised access to a system (1) can be made more difficult by creating usernames and passwords (1),
strong passwords (1), biometric tests (1), security tokens (1).
1 mark each for any of the following. (max 2)
Unauthorised access to data once a user is logged in (1) can be controlled by only authorising certain
users (1) by setting access rights (1).
2 a i 1 mark each for any of the following. (max 3)
Accidental deletion (1), disk problem (1), system failure (1), location forgotten (1), storage device lost
(1), file deleted or corrupted because of
a virus (1).
ii 1 mark each for any of the following. (max 3)
Encryption (1) possibly when storing data but certainly when transmitting it, authorisation policy
controlling access to data (1), giving different users different access rights (1). Controlling access to
the system (1), by setting user IDs and passwords (1), using methods to authenticate users (1),
biometric methods (1).
Note that the question says ‘describe’, so three names of features would not be worth three marks.
Note the assumption that the date has the day recorded before the month. Also note that when validation
checks are incorporated into software, they can be sophisticated and may give sensible reasons for not
accepting the data. It is very difficult to make the checks fool-proof. However, even if the validation check
covers every incorrect possibility, it cannot ensure that the data is correct. In the examples here, if the user
enters the wrong date, it will not be detected by the validation check.
9 0 1 0 1 0 0 1 1
1 0 1 1 0 0 0 1
1 1 0 1 0 0 0 0
1 0 0 1 1 1 0 0
1 0 1 1 0 0 1 0
1 0 1 1 0 0 0 1
1 0 1 1 0 0 0 1
0 0 0 1 0 1 0 0
In this method, the transmitting end creates the matrix from the original seven bytes containing the data.
The data is transmitted bit by bit. Then, the program at the receiving end recreates the matrix and checks that
all rows and all columns match even parity. With just one error, the position of the wrong bit can be identified
as illustrated by the example in this question. Note that, because each row and column contains eight bits,
you can count 1s or 0s.
2
0 1 1 0 0 1 1
3 a 0 1 0 0 0 1 1
This has bits 1, 3, 5 and 7 as 1, 0, 0 and 0, so the first parity bit indicates an error.
It has bits 2, 3, 6 and 7 as 1, 0, 1 and 0, so no error here.
It has bits 4, 5, 6 and 7 as 0, 0, 1 and 0, so the third parity bit also indicates an error.
If bit 5 is changed to 1 instead of 0, we have the code:
0 1 1 0 0 1 1
So again, the error is in the bit at position 5, which has been switched during transmission.
In the first example, parity bits at positions 1 and 4 showed an error. In the second example, it was parity
bits at positions 2 and 3.
The bit position that is incorrect is the one equal to the sum of the parity bit positions showing an error:
1 + 4 = 5 and 2 + 3 = 5