logo

Crowdly

A security engineer notices that an employee is bypassing an access control sys...

✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.

A security engineer notices

that an employee is bypassing an access control system by exploiting a weakness

in modular arithmetic calculations. The system verifies passwords by checking

whether H(P)≡K mod

  101, where H(P) is a hash of the password and

K is a stored value. The engineer suspects that the employee is leveraging a

property of numbers to derive passwords quickly.

What is the most likely

vulnerability being exploited?

a) Small prime modulus makes it

easy to compute modular inverses.

b) Fermat’s theorem can be used to derive the hash function’s properties.

c) The modulus is prime, allowing easy calculation of discrete logarithms.

d) The system is using a weak form of modular exponentiation that leaks

information.

100%
0%
0%
0%
More questions like this

Want instant access to all verified answers on lms.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!