You are on page 1of 6

Original Work Log

Ayush Patel

Day(s) Time Tasks Accomplished Reflection Next Goals

February 6, 9:30- I spoke to my mentor, Mr. McAninch, about my Originally, I believed that the Determine application
2020 11:00 am original work and he provided me with insight on most feasible password specifics, such as
(1.5 hrs) application development ​and ​feasibility​. security product I could make layout​ and ​user
Together, we came to the conclusion that an was a password cross checker. prompts​.
encrypted password generator is a more valuable However, after this discussion,
product than just a password crosschecker. After I learned that an ​encrypted
the meeting, I researched different ​coding password generator​ is a more
languages​ I could use to develop the application. relevant creation in terms of
societal use.

February 18, 10:30- I researched application functions and their This was a quick work section Ask questions about
2020 11:00 pm implementations, such as ​Google Firebase​, which prior to my mentor meeting. newly researched
(.5 hrs) is a free service that can be used to store user Because of my previous application
information, such as their password. Also coding experience, I only components​ and
templated ​application layout​. needed to research specific receive feedback on the
application development application template
components​ I will be utilizing from my mentor.
for the first time.

February 19, 3:00- I presented my research and template to Mr. This meeting was essential for Begin developing the
2020 4:30 pm McAninch. I was told that ​Google Firebase​ is a further development of the algorithm for ​password
(1.5 hrs) great option for storing user information, and also application, as my mentor and generation.
provides an adequate amount of security. We also I were able to come to a
determined that my application should be more consensus on the direction of
practical​ rather than educational. Lastly, my my application. Additionally,
mentor advised me to generate user-specific he was able to direct me to
passwords, such as the cases and their length. specific requirements my
application should prompt,
including ​case ​and ​length​.

February 22, 5:00- I coded​ initial prompts​ for the application, which This 3 hour work period was Begin coding the
2020 8:00 pm showed in the IDE output. This included the cases very productive, as I encryption algorithm​.
(4 hrs) the user wanted, the minimum length and developed the foundational
maximum length of the password. After reading in algorithm for ​generating
the user’s answers, I coded the​ algorithm​ that random passwords​ based on
generates a ​completely random password​ based the​ users’ requirements​.
on the previous answers.

February 26, 9:00pm- I coded the ​encryption algorithm​. I did this by This work period marked Begin changing the
2020 11:00pm creating an object for passwords, with parameters significant progress in the form of the program
(2 hrs) for the random symbols and a number representing development of the from​ IDE output​ to a
each character. This number, using a complex foundational aspects​ of the GUI​.
mathematical formula​ (the “encryption” aspect), application, as I was created a
would be used by the algorithm to convert the universal encryption
encrypted password back to the usable password. algorithm​ for the passwords.

March 1, 2020 12:00pm- After the cybersecurity group meeting, I recognized During this session, I not only Utilize new learnings to
12:45pm the significant ​weakness​ in my encryption method, learned about the usefulness of code ​new encryption
(.75 hrs) as one standard formula “secures” every password. hashing methods, such as algorithm​.
Therefore, I began researching better ways of HashCat​, in my project, but
encrypting passwords. I watched two videos on the also learned the ​difference
hashing process: between encryption and
https://www.youtube.com/watch?v=GI790E1JMgw hashing.
and
https://www.youtube.com/watch?v=hNKfEwTO3A
Q​. I learned about the difference between ​hashing
and encryption​ (storage/verification vs protection)
and the ​implementation​ of​ ​hashing.
March 18, 12:00pm- I attempted to code hashing algorithms, but quickly This additional research Utilize the Java hashing
2020 12:45pm realized I did not completely understand ​why​ I was session was essential, as I library to ​implement
(.75 hrs) utilizing hashing rather than encryption. Therefore, lacked a clear sense of multiple​ hashing
I conducted more research and found this article direction ​before reading this. methods​ into the
https://auth0.com/blog/hashing-passwords-one-way By understanding hashing’s application.
-road-to-security/​, through which I learned that one-way operations​, I know
hashing is essential because it’s ​a ​one-way now ​how ​to utilize it in my
operation​ (only encryption), compared to standard application.
encryption methods, which are two-way.

March 19, 5:30pm- I was able to utilize the hashing library within Java This was an extremely Finish the reversal
2020 7:00pm to code the ​SHA-256 encryption ​method. Using productive work session. By method​ (identifies if
(1.5 hrs) this method, I was successfully able to hash my completing this ​foundational the new password
inputted passwords. I was also able to ​add salt​ to aspect​ of my application on entered matches
the hashed password. Finally, I began working on a target with my timeline, it original password,
reversal method​ that would correctly identify the keeps me on track​ to add essentially
correct password entered based on the salted hash additional feature​s​ to my authentication​)
of the originally entered password. application.
March 27, 1:00pm- I created an ​Account class​, which would allow This was another productive Finish the ​reversal
2020 3:30pm users to create an account that could ​store all their work session, specifically in method​ for ​all
(2.5 hrs) passwords​. terms of ​password storage passwords​. Make sure
development. Although my all ​functionalities
original work is not in the form work​ (encryption,
of an application yet, I have decryption, multiple
developed the key components account
of the product. In other words, storage/creation) in
after my next work session, I preparation for
should be ready to transfer this changing my product
into the application form. into an ​application​.

This is essential in order to create the password


vault aspect of my application. Additionally, this
class allowed me to finish the​ reversal method​ for
the​ account login​, which checks if the entered
password is accurate in order to log into their
account.
April 3, 2020 12:00pm- During this work session, I decided to begin This was a good work session. Utilize​ Android Studio
1:00pm transitioning into​ application development​ rather Because I have a Macbook, to develop log in page
(1 hr) than finishing the reversal method, as I realized that this implementation process as well as the​ basic
some features may have to be recoded to fit into the was quite difficult (had to layout​ for the
application format. Therefore, I spend the time to install Windows 8.1​ on my application.
create an ​Android Studio project​ that has ​Google computer to ​run Android
Firebase ​Realtime database connected and already Studio + Firebase​), but this
implemented. This will allow me to code was essential in order to
application while seeing the product through further develop the application.
Firebase’s emulator​.

You might also like