1.1 Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.
2.2 This problem uses a real-world example of a symmetric cipher, from an old U.S. Special Forces manual (public domain). The document, filename SpecialForces.pdf, is available in the course files.
Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends.
Write your reasonable assumptions about how to treat redundant letters and excess letters in the memory words and how to treat spaces and punctuation. Indicate what your assumptions are.
Note: The message is from the Sherlock Holmes novel The Sign of Four.
3.3 Assume passwords are selected from four-character combinations of 26 alphabetic characters. Assume an adversary can attempt passwords at a rate of one per second.
4.2 Answer the following questions: