subject

Traditional password entry schemes are susceptible to "shoulder surfing" in which an attacker watches an unsuspecting user enter their password or PIN number and uses it later to gain access to the account. one way to combat this problem is with a randomized challenge response system. In these systems, the user enters different information every time based on a secret in response to a randomly generated challenge. Consider the following scheme in which the password consists of a five-digit PIN number (00000 to 99999). Each digit is assigned a random number that is 1,2, or 3. The user enters the random numbers that correspond to their PIN instead of their actual PIN numbers. For example, consider an actual PIN number of 12345. To authenticate the user would be presented with a screen such as:
PIN: 0 1 2 3 4 5 6 7 8 9
NUM: 3 2 3 1 1 3 2 2 1 3
The user would enter 23113 instead of 12345. This doesn’t divulge the password even if an attacker intercepts the entry because 23113 could correspond to other PIN numbers, such as 69440 or 70439. The next time the user logs in, a different sequence of random numbers would be generated, such as:
PIN: 0 1 2 3 4 5 6 7 8 9
NUM: 1 1 2 3 1 2 2 3 3 3
Your program should simulate the authentication process. Store an actual PIN number in your program. The program should use an array to assign random numbers to the digits from 0 to 9. Output the random digits to the screen, input the response from the user, and output whether or not the user’s response correctly matches the PIN number.
I have this code so far, but would like to input cstrings and vectors to fulfill the requirements, I need help with that. This is for c++ for beginners
#include
#include
#include
#include
using namespace std;
void generateRandomNumbers(int *random){ // Use current time as seed for random generator
srand(time(0));
for(int i=0;i<10;i++){
random[i] = 1 + rand() % 3;
}
}
bool isMatch(string pin, string randomPin, int *random){
int index;
for(int i=0;i<(int)pin. length();i++){ //converting pin number to int so that we can check the random number at that index
index = pin[i]-'0';
if((randomPin[i]-'0') != random[index-1])
return false;
}
return true;
}
int main()
{
string pin = "12345";
string randomPin;
int random[10];
generateRandomNumbers(random);
cout << "Randomly Generated numbers " << endl;
for(int i=0;i<10;i++)
{
cout << random[i] << " ";
}
cout << endl;
cout << "Now Enter your pin interms of random numbers: ";
cin >> randomPin;
if(isMatch(pin, randomPin, random)){
cout << "Both matches" << endl;
}
else
{
cout << "Sorry you entered wrong pin.." << endl;
}
}

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 10:40, Morghurley2000
"it security policy enforcement and monitoring" respond to the following: describe how monitoring worker activities can increase the security within organizations. describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct. explain the extent to which you believe an organization has the right to monitor user actions and traffic. determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.
Answers: 3
image
Computers and Technology, 23.06.2019 17:00, ayoismeisjjjjuan
The camera still is bad even with the new iphone xr and especially in low light it is even worst because you can see the pixels more if its in low light. if all you apple customers want apple to fix this then lets fill there feedback with complaints about the can apple do to fix this issue?
Answers: 1
image
Computers and Technology, 23.06.2019 23:30, cam961
What are "open-loop" and "closed-loop" systems
Answers: 1
image
Computers and Technology, 24.06.2019 12:50, vianca15
What percentage of teens plays video games? a.97% b.100% c.74% d.50%
Answers: 1
You know the right answer?
Traditional password entry schemes are susceptible to "shoulder surfing" in which an attacker watche...

Questions in other subjects:

Konu
Social Studies, 29.07.2019 02:50