Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

** JAVA EXPERT NEEDED (only answer if you are an expert please , also I need unique code do not copy from somwhere else) Make

** JAVA EXPERT NEEDED
(only answer if you are an expert please , also I need unique code do not copy from somwhere else)
Make sure to :
include comments throughout the code (i need to understand the code)
code should not be too complex
prefer Netbeans / Eclipse (show me the output)
image text in transcribed
Assignment Goat: practice creating static functions using class name. Traditional password entry schemes are susceptible to "shoulder surfing" or "interception in which an attacker watches an unsuspecting user enter his or her password or PIN number or intercepts the communication channel and retrieves the PIN. The attacker uses the compromised PIN later to gain access to the account. One way to combat this problem is with randomized challenge-response system. In these systems, the user enters different information every time based on a secret in response to a randomly generated challenge. Consider the following schemes in which the password consists of a five digit PIN number (00000 to 99999). Each digit is assigned a random number that is 1.2 or 3. The user enters the random numbers that correspond to their PIN instead of their actual PIN numbers For example, consider an actual PIN number of 12345. To authenticate it, the user would be presented with a screen such as the following: PIN: 0:23456789 323 11 3 2 2 1 3 The user would enter 23113 instead of 12345. This does not divuge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69440 or 70439. The next time the user logs in a different sequence of random numbers would be generated, such as the following: PIN: 0 1 2 3 4 5 6 7 8 9 NUM: Your program should simulate the authentication process. Store an actual PIN number in your program Output the random digits to the screen, input the response from the user, and output whether or not the user's response correctly matches the PIN number. The program should allow only 3 trials of incorrect PIN entry (note that with each trial, a new random sequence is generated), If all trials fail then the program should exit. Design and implement a utility Authentication classe all variables and methods are static). The class should have methods to generate an array of the random numbers to be displayed and verify if the user entry is equivalent to the actual PIN or not. NUM: For example you can implement the following methods: Authentication generate sequencel) Authentication, verty (correct PIN, user Response) tools Your main method should run the challenge response system. For this exercise, provide a readme file with the expected correct PIN used by the program

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases In Networked Information Systems 6th International Workshop Dnis 2010 Aizu Wakamatsu Japan March 2010 Proceedings Lncs 5999

Authors: Shinji Kikuchi ,Shelly Sachdeva ,Subhash Bhalla

2010th Edition

3642120377, 978-3642120374

More Books

Students also viewed these Databases questions

Question

=+Where does the focus of labor relations lie? Is it collective

Answered: 1 week ago