Professional Documents
Culture Documents
Ayush Patel
February 6, 9:30- I spoke to my mentor, Mr. McAninch, about my Originally, I believed that the Determine application
2020 11:00 am original work and he provided me with insight on most feasible password specifics, such as
(1.5 hrs) application development and feasibility. security product I could make layout and user
Together, we came to the conclusion that an was a password cross checker. prompts.
encrypted password generator is a more valuable However, after this discussion,
product than just a password crosschecker. After I learned that an encrypted
the meeting, I researched different coding password generator is a more
languages I could use to develop the application. relevant creation in terms of
societal use.
February 18, 10:30- I researched application functions and their This was a quick work section Ask questions about
2020 11:00 pm implementations, such as Google Firebase, which prior to my mentor meeting. newly researched
(.5 hrs) is a free service that can be used to store user Because of my previous application
information, such as their password. Also coding experience, I only components and
templated application layout. needed to research specific receive feedback on the
application development application template
components I will be utilizing from my mentor.
for the first time.
February 19, 3:00- I presented my research and template to Mr. This meeting was essential for Begin developing the
2020 4:30 pm McAninch. I was told that Google Firebase is a further development of the algorithm for password
(1.5 hrs) great option for storing user information, and also application, as my mentor and generation.
provides an adequate amount of security. We also I were able to come to a
determined that my application should be more consensus on the direction of
practical rather than educational. Lastly, my my application. Additionally,
mentor advised me to generate user-specific he was able to direct me to
passwords, such as the cases and their length. specific requirements my
application should prompt,
including case and length.
February 22, 5:00- I coded initial prompts for the application, which This 3 hour work period was Begin coding the
2020 8:00 pm showed in the IDE output. This included the cases very productive, as I encryption algorithm.
(4 hrs) the user wanted, the minimum length and developed the foundational
maximum length of the password. After reading in algorithm for generating
the user’s answers, I coded the algorithm that random passwords based on
generates a completely random password based the users’ requirements.
on the previous answers.
February 26, 9:00pm- I coded the encryption algorithm. I did this by This work period marked Begin changing the
2020 11:00pm creating an object for passwords, with parameters significant progress in the form of the program
(2 hrs) for the random symbols and a number representing development of the from IDE output to a
each character. This number, using a complex foundational aspects of the GUI.
mathematical formula (the “encryption” aspect), application, as I was created a
would be used by the algorithm to convert the universal encryption
encrypted password back to the usable password. algorithm for the passwords.
March 1, 2020 12:00pm- After the cybersecurity group meeting, I recognized During this session, I not only Utilize new learnings to
12:45pm the significant weakness in my encryption method, learned about the usefulness of code new encryption
(.75 hrs) as one standard formula “secures” every password. hashing methods, such as algorithm.
Therefore, I began researching better ways of HashCat, in my project, but
encrypting passwords. I watched two videos on the also learned the difference
hashing process: between encryption and
https://www.youtube.com/watch?v=GI790E1JMgw hashing.
and
https://www.youtube.com/watch?v=hNKfEwTO3A
Q. I learned about the difference between hashing
and encryption (storage/verification vs protection)
and the implementation of hashing.
March 18, 12:00pm- I attempted to code hashing algorithms, but quickly This additional research Utilize the Java hashing
2020 12:45pm realized I did not completely understand why I was session was essential, as I library to implement
(.75 hrs) utilizing hashing rather than encryption. Therefore, lacked a clear sense of multiple hashing
I conducted more research and found this article direction before reading this. methods into the
https://auth0.com/blog/hashing-passwords-one-way By understanding hashing’s application.
-road-to-security/, through which I learned that one-way operations, I know
hashing is essential because it’s a one-way now how to utilize it in my
operation (only encryption), compared to standard application.
encryption methods, which are two-way.
March 19, 5:30pm- I was able to utilize the hashing library within Java This was an extremely Finish the reversal
2020 7:00pm to code the SHA-256 encryption method. Using productive work session. By method (identifies if
(1.5 hrs) this method, I was successfully able to hash my completing this foundational the new password
inputted passwords. I was also able to add salt to aspect of my application on entered matches
the hashed password. Finally, I began working on a target with my timeline, it original password,
reversal method that would correctly identify the keeps me on track to add essentially
correct password entered based on the salted hash additional features to my authentication)
of the originally entered password. application.
March 27, 1:00pm- I created an Account class, which would allow This was another productive Finish the reversal
2020 3:30pm users to create an account that could store all their work session, specifically in method for all
(2.5 hrs) passwords. terms of password storage passwords. Make sure
development. Although my all functionalities
original work is not in the form work (encryption,
of an application yet, I have decryption, multiple
developed the key components account
of the product. In other words, storage/creation) in
after my next work session, I preparation for
should be ready to transfer this changing my product
into the application form. into an application.