Topic: Tech & EngineeringData

Last updated: April 13, 2019

In our purposed system, we try to assure that the users’ data is safe by implementing a system which “provides security mechanisms” by offering three layers of security. The system uses a password generator algorithm to implement passwords as well as keys for authorizing the user. The algorithm generates a password and a key of 8 bit length consisting of combinations of characters, special characters, as well as numbers.Questions may arise as why do we use keys of 8 bit length only? The purpose of our system is to prevent unauthorized data access if the users’ credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust.


I'm Piter!

Would you like to get a custom essay? How about receiving a customized one?

Check it out