Answershould be original, and similarity (plagiarism)not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and shouldbe clear understanding...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understanding (500 words).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:


Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)


Author: Anderson, R.


ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526


Publisher: John Wiley & Sons



Book available from below link:



http://www.cl.cam.ac.uk/~rja14/book.html


Chapter 2 (pp 17-60), chapter 4 (pp 93-104), chapter 6 (pp 192-211).


Skim sections 4.2.3-4.2.7, 4.3, 6.2, 6.4.2. Total - 73 pages



Assignment is:


Can you design an improved interactive password system? Present your design and describe what kind of attacks your protocol can protect.





Please I need new idea not like the available answers.



Answered Same DayDec 22, 2021

Answer To: Answershould be original, and similarity (plagiarism)not more than 10% this is very important...

David answered on Dec 22 2021
119 Votes
Introduction
There are different types of digital authentication systems used in the world today. Some of the
most
widely used are:
a) Facial recognition authentication system
b) Pattern based recognition authentication system
c) Password / PIN based authentication system.
d) Biometric recognition authentication system
e) Visual authentication (Includes recognition of photos etc.)
Among the authentication systems mentioned above, the most popular is the password based
authentication system. It is one of the oldest, easiest and one of the most robust authentication
system in the world today. However it has come of its age and although it may be widely used, in
some time, it might just be replaced with something better. Here are some of its pros and cons:
Advantages
a) Easiest to implement
b) One of the most secure and difficult to crack is the simple password based authentication
system especially if the password is non-dictionary based and includes symbols and other
characters.
c) The most popular authentication system in the world, so many is accustomed to it.
Disadvantages
a) It is easily cracked able with a brute force attack. Even if...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here