Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please use // for explaining detail in code. COSC 359 3- Store user ID, Salt and hashed password in ID-PASSWORD.TXT User Authentication // PART B:

image text in transcribedPlease use // for explaining detail in code.

COSC 359 3- Store user ID, Salt and hashed password in ID-PASSWORD.TXT User Authentication // PART B: USER AUTHENTICATION Description Enhance your code from PART A for the following activities A widely used password security technique is the use of hashed passwords and a salt value. This scheme is found on virtually all UNIX variants as well as on a number of other operating systems as shown in Figure 3.1 bellow. To load a new password into the system, the user selects or is assigned a password This password is combined with a fixed-length sal value. In older implementations, this value is related to the time at which the password is assigned to the user. Newer implementations use a pseudorandom or random number. The password and salt serve as inputs to a hashing algorithm to produce a fixed-length hash code. The hash algorithm is designed to be slow to execute to thwart attacks. The hashed password is then stored, together with a plaintext copy of the salt, in the password file for the corresponding user ID. The hashed-password method has been shown to be secure against a variety of cryptanalytic attacks [WAGNOO] When a user attempts to log on to a UNIX system, the user provides an ID and a password. The operating system uses the ID to index into the password file and retrieve the plaintext salt and the encrypted password. The salt and user-supplied passwords are used as input to the encryption routine. If the result matches the stored value, the password is accepted 1- Ask users for ID/Password pair 2- Authentlcate users using ID.txt and the ID-PASSWORD.TXT flles ak Hash oodke Passwerd // PART A: ID/PASSWORD CREATION low hash Write the necessary C++ code (or a language of your choice) for the following activities: Compare 1- Create user ID and Password pair by asking users to input ID/Password Verilying o password Check the input and help users to choose an acceptable ID/Password based on the company security policy Figure 3.1 UNIX Password Scheme 2- Create a Salt value, add t to the Password and use a hash function to encrypt both Salt and Password COSC 359 3- Store user ID, Salt and hashed password in ID-PASSWORD.TXT User Authentication // PART B: USER AUTHENTICATION Description Enhance your code from PART A for the following activities A widely used password security technique is the use of hashed passwords and a salt value. This scheme is found on virtually all UNIX variants as well as on a number of other operating systems as shown in Figure 3.1 bellow. To load a new password into the system, the user selects or is assigned a password This password is combined with a fixed-length sal value. In older implementations, this value is related to the time at which the password is assigned to the user. Newer implementations use a pseudorandom or random number. The password and salt serve as inputs to a hashing algorithm to produce a fixed-length hash code. The hash algorithm is designed to be slow to execute to thwart attacks. The hashed password is then stored, together with a plaintext copy of the salt, in the password file for the corresponding user ID. The hashed-password method has been shown to be secure against a variety of cryptanalytic attacks [WAGNOO] When a user attempts to log on to a UNIX system, the user provides an ID and a password. The operating system uses the ID to index into the password file and retrieve the plaintext salt and the encrypted password. The salt and user-supplied passwords are used as input to the encryption routine. If the result matches the stored value, the password is accepted 1- Ask users for ID/Password pair 2- Authentlcate users using ID.txt and the ID-PASSWORD.TXT flles ak Hash oodke Passwerd // PART A: ID/PASSWORD CREATION low hash Write the necessary C++ code (or a language of your choice) for the following activities: Compare 1- Create user ID and Password pair by asking users to input ID/Password Verilying o password Check the input and help users to choose an acceptable ID/Password based on the company security policy Figure 3.1 UNIX Password Scheme 2- Create a Salt value, add t to the Password and use a hash function to encrypt both Salt and Password

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Manga Guide To Databases

Authors: Mana Takahashi, Shoko Azuma, Co Ltd Trend

1st Edition

1593271905, 978-1593271909

More Books

Students also viewed these Databases questions

Question

2. Discuss the steps in preparing a manager to go overseas.

Answered: 1 week ago