Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question: Traditional password entry scheme are susceptible to "shoulder surfing" in which an attacker watches an unsuspecting user enter their password or pin number and uses it later to gain access to the account. One way to combat this problem is with a randomized challenge-response system. In these system the user enters different information every time based on a secret in response to a randomly generated challenge Consider the following scheme in which the password consists of a five-digit pin number (00000 to 99999). Each digit is assigned a random number that is 1, 2, or 3. The user enter the random numbers that correspond to their PIN instead of their actual PIN number.
For example, consider an actual PIN number of 12345. To authenticate the user would be presented with a screen such as:

PIN:      0     1      2       3       4       5       6       7       8       9

NUM:     3     2      3       1       1       3       2       2       1       3        


The user would enter 23113 instead of 12345. This doesn't divulge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69400 or 70439. The next time the user logs in, a different sequence of random numbers would be generated, such as:

PIN:      0     1      2       3       4       5       6       7       8       9

NUM:     1     1      2       3       1       2       2       3      3       3

Write a program to simulate the authentication process. Store an actual PIN number in your program. The program should use an array to assign random number to the digits from 0 to 9. Output the random digits to the screen, input the response correctly matches the PIN number.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92470306
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Strategies when resources are constraineda project manager

Strategies When Resources Are Constrained A project manager has fewer options for accelerating project completion when additional resources are either not available or the budget is severely constrained. This is especial ...

Question project risk management planpurpose this project

Question: Project: Risk Management Plan Purpose: This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to repl ...

Question suppose we iterate the application of a blurring

Question : Suppose we iterate the application of a blurring filter with kernel size 5 on an image of 800 times 600 pixels. How many times should we apply the filter for the color of the pixel at position (20, 20) to be i ...

Patient patientid familyname givenname address suburb state

PATIENT (PatientID, FamilyName, GivenName, Address, Suburb, State, PostCode) DOCTOR (ProviderNo, Name) ITEM (ItemNo, Description, Fee) ACCOUNT (AccountNo, ProviderNo, PatientID, TreatmentDate) ACCOUNTLINE (AccountNo, Ite ...

In some states allow requires drivers to turn on their

In some states allow requires drivers to turn on their headlights when driving in the rain. A highway patrol officer believes that lesson one-quarter of all the drivers follow this rule. As a test, he randomly samples 20 ...

Suppose you have to write a small java program that catches

Suppose you have to write a small Java program that catches exceptions with super classes. You are required to use inheritance to create an exception superclass (called ExceptionA) and exception subclasses ExceptionB and ...

Find minimal dfas for the following languages in each case

Find minimal dfa's for the following languages. In each case prove that the result is minimal. (1) L = {a n bm> :n≥2,m≥1}. (2)L = {a n :n ≥ 0,n ≠ 3} (3) L = {a n :n mod 3 = 0}∪{a n : n mod 5 = 1}

Write a program that populates an array named weekday from

Write a program that populates an array named weekday from the string SunMonTueWedThuFriSat, and then prints each day in uppercase. PERL Language.

What is a domain name in the context of internet what is

What is a domain name in the context of Internet? What is the procedure to get a domain name and link it to an Internet Protocol (IP) address? Use an example.

Question state the dilemma the score as he puts it harnish

Question : State the dilemma ("the score", as he puts it) Harnish finds between the Humean view and the Frege-Russell view of representation. Do you think a computational theory of mind is a viable alternative to these v ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As