Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

C++ code blocks o etisalat 4G5:12 PM 100% HW3 1. Shoulder Surfing Traditional password entry schemes are susceptible to shoulder surfing in which an attacker

image text in transcribedC++ code blocks
o etisalat 4G5:12 PM 100% HW3 1. Shoulder Surfing Traditional password entry schemes are susceptible to "shoulder surfing" in which an attacker watches an unsuspecting user enter their password or PIN number and uses later to gain access to the account. One way to combat this problem is with a randomized challenge- response system. In these systems the user enters different information every time based on a secret in response to a randomly generated challenge. Consider the following scheme in which the password consists of a five-digit PIN number (00000 to 99999). Each digit is assigned a random number that is 1, 2, 3, or 4-The user enters the random numbers that correspond to their PIN instead of their actual PIN numbers For example, consider an actual PIN number of 12345. To authenticate the user would be presented with a screen such as PIN 0 1 2 3 4 5 6 7 8 9 The user would enter 23113 instead of 12345This doesn't reveal the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69440 or 70439. The next time the user logs in, a different sequence of random numbers would be generated, such as: PIN NUM 0 1 2 3 4 5 6 7 8 9 1 4 2 3 4 2 1 3 3 3 Your program should simulate the authentication process. Store an actual PIN number in your program (use initializer's list). The program should use an array to assign random numbers to the digits from 0 to 9. Output the random digits to the screen, input the response from the user, and output whether or not the user's response correctly matches the PIN number. See sample input / output for the PIN 35957

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals Design

Authors: Marion Donnie Dutton Don F. Seaman

14th Edition Globel Edition

1292107634, 978-1292107639

More Books

Students also viewed these Databases questions

Question

Question What is a Roth 403 (b) plan?

Answered: 1 week ago