Skip to content

Computer Security exercises containing password cracking, user authentication, HMAC, Needham Schroeder Protocol and Linux file and folder permissions

Notifications You must be signed in to change notification settings

AishaSaleem110/ComputerSecurityUserAuthentication

Repository files navigation

Computer_Security_User_Authentication

This is Assignment 2 of Computer Security Module and contains multiple simple exercises to demonstrate the following:

  1. Week17 - This week covers some password cracking exercises
  2. Week18 - This week covered some exercises about different methods of user authentication
  3. Week19 - This week covers exercises which are beyond user authentication, including Message Authentication with HMAC (Hash-based message authentication code),Needham Schroeder Protocol, Demonstrating an attack on Needham Schroeder Protocol
  4. Week20 - This week covers setting Linux file and folder permissions.

The Code

This code is written in Python 3.10 (using PyCharm IDE)

Running The Code

*To run the code, open the terminal and go to the directory where the code resides and run the code files individually. For example to run W17Q1.py python W17Q1.py

*The files are self-contained and all necessary libraries are imported.

What is in the code

The code is dividing into two parts:

Part1 - contains exercises demonstrating simple user authentication, password cracking exercises. (For more information , check the attached weekly brief). Part 2 - contains an advanced exercise which is Fixing Needham-Schroeder protocol to save from Replay attacks by introducing timestamp and extra nounces to verify users.

A log book CO876-as2634-CW2 is also attached which describes how I did each exercise

About

Computer Security exercises containing password cracking, user authentication, HMAC, Needham Schroeder Protocol and Linux file and folder permissions

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages