Cracking a password can involve different schemes, which involve several different approaches and strategies. This usually includes database access with protected passwords. Serval classic approaches include data dictionary, brute-force, and rainbow attacks. Although there are numerous tools such as Hextools and Hashcat, your job is to come up with strategy that is based on a (subset) of industry-related software deliverables that address this security breach. Use the following parameters to guide you: ï‚· A Conceptual Approach that should include a Problem Domain Statament (e.g. Government Security domain) and the associated Requirements. ï‚· Design Part1, which should include a Visual Representation Diagram such as UML, Use-Case, Logic Flow Diagram, or other pictorial view. ï‚· Design Part2, which should include Pseudo- Code and your Algorithmic Process (i.e. algorithm). These can be combined. ï‚· Implementation: Optional. Can include code snipt(s) such as Java, Python, JavaScript, etc., examples. Your solution should also utilize a classic area of research and deployment: user authentication via keystroke recognition. Consider the following patterns: 1. Key-up/Key-down: The time it takes to release one key vs the press of the next one. 2. Key-down/Key-up: The overall time it takes to release the key pressure of the next consecutive key where the use of a two simultaneous key pattern can occur such as double ASCII (or Unicode) code is entered or two or more devices (independent standalone CPUs). 3. Wait-period: The time that it takes to press and release from one key to another, but has a longer period of time when compared to 1 or 2 (i.e. user/software may be waiting to complete or guess at a password w.r.t. a hash/technique). Assumption 1: Password attempt must exactly match (stored) user password with respect to ASCII key code. Assumption 2: There does not exist a software hack that can defeat this problem.