Develop an event based onetime password system

Assignment Help JAVA Programming
Reference no: EM131259907

Cryptography

Assignment

Overview

In this assignment you will develop an event based onetime password (OTP) system. The system consists of the following components:

1. A soft OTP token UI which consists of a push button and a display control. Clicking on the button will generate and display the onetime password.

2. A test UI which will prompt the user to provide the OTP, show access granted message only if the right OTP is entered.

You will need to do the following:

1. Develop, build and test the UI components.

2. Perform Collision Resistance analysis on both algorithms.

Feedback One-Time Password Algorithm (FOTP):

Hash Feedback One-Time Password Algorithm described in the following chart. Secret key is used as the initialization vector. The first OTP is generated by hashing this vector. The second OTP is generated by hashing the hash generated by the first the 1st OTP, and so on. The OTP is calculated by truncating the hash into a six digit value.

2450_Figure.jpg

 

You can set Key = 909670FF00FF00012.

Collision Resistance

This property describes the probability of generating the same OTP over a period of time. A good OTP generation algorithm should demonstrate strong collision resistance. Two metrics are calculated in N number of OTPs:

CR1: the number of similar OTPs in N.

CR2: the number of similar two consecutive OTPs in N.

You will need to submit the following:

1. Complete source code and screen captures of the running program.

2. A study of the collision property. Generate 1,000,000 OTPs using your application. Show a graph describing how the collision properties evolve as the number of OTPs increases.

Verified Expert

Solution is about creating Hash Feedback One-Time Password and analysis of collision property. I have programmed algorithm and created GUI for generation and testing of OTP. My solution will generate 6 digit OTP. This algorithm provides better way to create OTP using secret key and feed-back hash and By this we can achieve maximum randomization in our OTP which enhances security. We can use this solution in web based application or cloud based application or stand-alone -application.

Reference no: EM131259907

Questions Cloud

Distinguish between customer service goals and objectives : Distinguish between customer service goals and objectives. How do characteristics such as substitutability and product life cycle stage influence the development ofcustomer service goals and objectives?
Competitive analysis of product : Consider yourself in a leather industry. How would you do competitive analysis of your product (leather jackets) with the help of Porter's Forces Model?
Discuss how human factors influence the effectiveness : are the major cybersecurity issues related to the above topic? What policy controls would you recommend to help manage the above topic? Discuss how Human Factors influence the effectiveness of these recommended policy controls.
What is the total amount of interest expense : Assume that a machine was purchased for $50,700. Cash of $21,700 was paid, and a four-year, 14% note payable was signed for the balance. What is the total amount of interest expense that will be reported over the life of the note?
Develop an event based onetime password system : Develop an event based onetime password (OTP) system - A study of the collision property. Generate 1,000,000 OTPs using your application. Show a graph describing how the collision properties evolve as the number of OTPs increases.
What is the leader''s function in this conceptualization : What is meant by "substitutes for," and "neutralizers of," leadership? Give some subordinate, task, and organizational examples of these substitutes and neutralizers.
Should us government play in health coverage for americans : What role, if any, should the U.S. Government play in health care coverage for Americans? Should the government's role in terms of health insurance be different for those with jobs and for those without jobs?
Does the detective have to turn the case over to the fbi : Better yet, how does the detective get jurisdiction over the criminal even if he or she can be located? Or does the detective have to turn the case over to the FBI? Scotland Yard? Interpol? What if what you want to prosecute is not against the law..
Describe what is meant by an authentic leader : What is the GLOBE project? What cultural dimensions have been identified by the GLOBE researchers? What findings have been found by this GLOBE research effort in terms of the six major leadership dimensions found in various cultures?

Reviews

len1259907

10/28/2016 2:42:20 AM

Event based one time password system has to be developed by using the algorithm - In this assignment you will develop an event based onetime password (OTP) system. The system consists of the following components

Write a Review

JAVA Programming Questions & Answers

  How to add a static data member

Create one project for each problem; add comments to your code -  write a program which Add a static data member to count the number of objects will be created.

  Discuss how contrast and conformity contribute to a quality

Discuss how contrast and conformity contribute to a quality web page

  Write the logical expression in postfix notation.

Given symbols p, q, r, and s for propositions. Draw the binary tree representation of the logical expression ((p || r) && ! p ) || s) && (q || r). Write the logical expression in postfix notation.

  Write a number guessing game in java

ou have to write a number guessing game in Java. The program should have three difficulty levels, each one having a different maximum number. After the user selects a difficulty,

  Text file containing the data

This program should begin by asking the user for the name of a text file containing the data. Then read the data which will be a line containing the dimensions of a 2 dimensional array followed by a 2 dimensional array of ints. Then perform variou..

  Prepare address book java application

Prepare an application that reads the contents of your address book file and prepare a user guide that includes a description of the functionality of your overall address book system.

  Create a world class that contains a 2d array

You have to create a world class that contains a 2d array then create an abstract class called organism that contains move() method the organism should move randomly one step at the time.

  Write a public static method writetokenstolines

Write a public static method called writeTokensToLines that will read an input file one token at a time using Scanner, and write the tokens to a file using a PrintWriter, one token per line, with the tokens numbered starting at 1.

  Write a java program to find the summation

CS480 - Write a Java program to find the summation of all the integers entered on command line and write above program using JOptionPane input Dialog box.

  Why the java is called platform independent

Why the Java is called platform independent? Discuss.

  Which statement is true about a non-static inner class

Which statement is true about a non-static inner class? Clicking the closing button on the upper-right corner of a frame generates a(n) _____ event.

  Critics of american often that teacher''s unions represent

Which organization has proposed a set of standards for both elementary level and secondary-level teachers? According to the latest info.,  teachers will be most needed in which of the following areas: Critics of American often argue that teacher's un..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd