Write a program to simulate the authentication process

Assignment Help Computer Engineering
Reference no: EM13322490

Traditional password entry schemes are susceptible to "shoulder surfing" in which an attacker watches an unsuspecting user enter their password or PIN number and uses it later to gain access to the account. One way to combat this problem is with a randomized challenge-response system. In these systems the user enters different information every time, based on a secret in response to a randomly generated challenge. Consider the following scheme, in which the password consists of a five-digit PIN number (00000 to 99999). Each digit is assigned a random number that is 1, 2, or 3. The user enters the random numbers that correspond to their PIN instead of their actual PIN numbers.

For example, consider an actual PIN number of 12345. To authenticate the user would be presented with a screen such as:

PIN: 0 1 2 3 4 5 6 7 8 9
NUM: 3 2 3 1 1 3 2 2 1 3

The user would enter 23113 instead of 12345. This doesn't divulge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69440 or 70439. The next time the user logs in, a different sequence of random numbers would be generated, such as:

PIN: 0 1 2 3 4 5 6 7 8 9
NUM: 1 1 2 3 1 2 2 3 3 3

Write a program to simulate the authentication process using this scheme. Store an actual PIN number in your program. The program should use an array to assign random numbers to the digits from 0 to 9. Output the random digits to the screen, input the response from the user, and output whether or not the user's response correctly matches the PIN number.

 

Reference no: EM13322490

Questions Cloud

Explain how many electrons were transfered : A current of 0.600 A is passed through a cell for 5min and 30 s. How much charge (in C) was trasferred? How many electrons were transfered
Find dimension parameters that affect the drag coefficient : The flow is incompressible, but friction and inertia influences the flow pattern. Use dimensional analysis. Find the dimension parameters that affect the drag coefficient.
Organizations have several types of cultures : The following relates to managing groups and teams and the online videos you must view. Organizations have several types of cultures that can grow within them over time
What voltage is present in its secondary coil : The primary coil of a transformer has 100 turns and its secondary coil has 400 turns. If theac voltage applied to the primary coil is 120V
Write a program to simulate the authentication process : The user would enter 23113 instead of 12345. This doesn't divulge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers.
Explain surface complex formation with a weak acid : Why does surface complex formation with a weak acid lead to a relative maximum in the extent of surface complex formation (adsorption) at a pH which is usually near the value of -log acidity constant of the weak acid (pKHA)
Estimate the required stack height for wind speeds : A plant is to be constructed that will emit 3.5 metric tons of hydrogen sulfide per day. One of the design criteria is that the concentration 1 km downwind from the stack must not exceed 120 micrograms/m3.
What is the net force of the coil : A long straight wire carrries a current I1 of 15 A. A rectangular coil with two sides parallel to the straight wire has sides 5 cm, what is the net force of the coil
Strategic management : Text: Strategic Management (10th ed. by Charles W. Hill and Gereth Jones)Assignment Chapter (Strategic Leadership: Managing the Strategy-Making Process for Competitive Advantage)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down a swing applet that displays

Write down a Swing applet that displays your name (Gary Vega) in blue the first time the user clicks a JButton4, and then displays your name larger and in gray second time the user clicks the JButton. Save program as JBlueGray.java

  Express the process of customer identification

Then, customer brings the videos to the front desk where an attendant identifies the customer using customer's ID Card, checks the customer's records in the system, and then enters information about rented videos into the system.

  Define compensation structure and job design research

Assess value of the position using a job-based approach. The job based approach will assess the value that the specific position brings to the organization.

  Which of them are changing and into what direction

could you make predictions about future development. Which of them are changing and into what direction.

  Network that contains several netware 4.11 servers

Your company has a network that contains several NetWare 4.11 servers and uses IPX as the routing protocol. Each of the network segments has as a minimum  one NetWare server on it. Which of the following responds to a Get Nearest Server (GNS) reque..

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Define the facts they have learned simultaneously hold

An efficient algorithm is proposed to do this: either it produces proposed dates of birth and death for each of the n people so that all facts hold true, or it reports (correctly) that no such dates can exist. That is the facts collected by the sci..

  Define open-source and proprietary databases

describe open-source and proprietary databases. What are some advantages and disadvantages of each type of database? What characteristics a business should consider when choosing a database.

  Determining the sub game-perfect equilibrium

First Al shoots targeting one of the other two gangsters. After Al, if alive, Bob shoots, targeting one of the surviving gangsters.

  Write down a c function that adds the values

Write a C function that adds the values of all elements in a two-dimensional array that is passed to the function, suppose that the array is an array of double-precision numbers having 4 rows and 5 columns.

  Context free language

Let L1 be the regular language and L2 be the context-free language, both described over the same alphabet Σ. a) Is L1∩L2 always regular? Explain your claim.

  Write down an application that reads 3 integers

Write down an application that reads 3 integers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd