An old encryption system uses 24-bit keys. A cryptanalyst, who wants to brute-force attack the encryption system, is working on a computer system with a performance rate N keys per second.
- How many possible keys will be available in the above encryption system? (5 marks)
- What will be the maximum number of keys per second (N), that the computer system is working with, if the amount of time needed to brute-force all the possible keys was 8192 milli seconds? (10 marks)
While reading about Big Data, you might find the term “ETL”.
Using you own words, answer the following questions:
- What does the term ETL stand for? (2 marks)
- Define each of the three functions that the ETL tools combine. (9 marks)
- What main role does ETL play in Big Data? (4 marks)
- One of the advantages of Data Extraction tools is Scalability. Discuss (5 marks)