Use an array to assign random numbers to the digits

Assignment Help Computer Engineering
Reference no: EM13323344

Traditional password entry schemes are susceptible to "shoulder surfing" in which an attacker watches an unsuspecting user enter their password or PIN number and uses it later to gain access to the account. One way to combat this problem is with a randomized challenge-response system. In these systems, the user enters different information every time based on a secret in response to a randomly generated challenge. Consider the following scheme in which the password consists of a five-digit PIN number (00000 to 99999). Each digit is assigned a random number that is 1, 2, or 3. The user enters the random numbers that correspond to their PIN instead of their actual PIN numbers. For example, consider an actual PIN number of 12345. To authenticate, the user would be presented with a screen such as

PIN: 0 1 2 3 4 5 6 7 8 9

NUM: 3 2 3 1 1 3 2 2 1 3

The user would enter 23113 instead of 12345. This does not divulge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69440 or 70439. The next time the user logs in, a different sequence of random numbers would be generated, such as

PIN: 0 1 2 3 4 5 6 7 8 9

NUM: 1 1 2 3 1 2 2 3 3 3

Your program should simulate the authentication process. Store an actual PIN number in your program. The program should use an array to assign random numbers to the digits from 0 to 9. Output the random digits to the screen, input the response from the user, and output whether or not the user's response correctly matches the PIN number.

 

Reference no: EM13323344

Questions Cloud

How far apart are the trains : An eastbound subway train accelerates from rest at 1.22 m/s2 along a straight track. How far apart are the trains when the eastbound subway train is traveling at the same speed as the westbound train
Determine max shearing stress and coexisting normal stress : A 40 mm diameter solid brass shaft in a marine vessel is subjected to a simultaneous torsion of T=250 N.m and axial thrust of P=25kN. Show the combined state of stress on the surface element of the shaft.
What advantages and disadvantages are to implementation : Do you foresee any technical difficulties in deploying this architecture? What advantages and disadvantages are there to this implementation?
Explain what mass in g of iron is needed to evolve : What mass (in g) of iron is needed to evolve 730.5 kJ of heat under standard conditions as it forms iron(III) oxide
Use an array to assign random numbers to the digits : Output the random digits to the screen, input the response from the user, and output whether or not the user's response correctly matches the PIN number.
Explain the sum of the stoichiometric coefficients : What is the sum of the stoichiometric coefficients the formation reaction for methanol (CH3OH). Enter any fraction as a decimal.
What is the pressure in the head of the flowing water : A combined pitot static tube has a coefficient of 0.98. Thedifferential head reading is 0.874m of water when it is positionedon the centreline of a pipe of constant diameter.
Compute where will the image be formed : a diverging lens has a focal length of 50 a source of light is placed 100 cm in front of lens in front of the lens. where will the image be formed
Find where building should be located relative to centreline : A developer has requested permission to build a large retail store at a location adjacent to the intersection of an undivided four-lane major road and a two-lane minor road. Traffic on the minor road is controlled by a stop sign.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd