‘Manual Attack’ as against ‘Automated Attack’
I was recently challenged with this question – “Selection of several images on a matrix of 36 images, for instance, would only give the level of mathematical strength that a long PIN provides. Is it any better than using long PINs?”
Our answer is “We could consider the threats of 'visual-manual attacks on display' and 'automated attacks' separately, say, we should be able to think of the measures to cope with them separately.
A figure of ’20-bit’, for instance, would be just a bad joke against automated attacks, whereas it would make a pretty tall wall against visual-manual attacks on display, particularly when the positions of images are shuffled on each trial.
Try the image-to-code conversion at our new website and you will see what kind of mathematical strength your image memory can generate/regenerate against automated attacks - https://www.mnemonicidentitysolutions.com/
Many more questions are answered in “Questions and Answers - Expanded Password System and Related Issues”
Key References
Account Recovery with Expanded Password System
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History - Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Additional References
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers - Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes - narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space - "below-one" factor authentication
Articles from Hitoshi Kokumai
View blogI got interested in this article -on the password problem · “Tech Q&A” · https://www.unionleader.c ...
Our password headache may well be the consequence of these dual causes - · ‘Use of Impracticable Pas ...
Today's topic is “Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of cr ...
Related professionals
You may be interested in these jobs
-
Mortgage Case Manager
Found in: Talent UK C2 - 2 days ago
MyWork Bournemouth, United KingdomThis is a remoteposition. · Case Manager / ProcessorMortgages · Fully remote remote position applicantsmust reside in the UK · My client is a household name and anestablished leader within their niche employing circa 150 peopleacross the UK. · As an innovative disruptorwithin ...
-
Chief Financial Officer
Found in: Appcast UK C C2 - 3 days ago
Marks Sattin England, United KingdomMarks Sattin Executive Search has a challenging opportunity at a PE-backed business who are currently seeking a CFO to provide leadership within the business by planning, negotiating, and executing restructuring plans to stabilise the business. · Reporting to the CEO and working ...
-
Telephone Business Development Manager
Found in: Jooble UK O C2 - 2 days ago
CRG Epping Forest, Essex, United KingdomBusiness Development Manager - Energy Solutions · CRG are working with an established energy solutions provider offering a comprehensive range of mechanical and electrical services, encompassing consultancy, design, supply, and installation. Lighting & Energy, Service & Maintenan ...
Comments
Zacharias 🐝 Voulgaris
2 years ago #7
I'm sure that with your open-mindedness and resources, we can work out a professional deal that would be mutually beneficial and help bring closure to this topic.
Hitoshi Kokumai
2 years ago #6
Steganography is not the subject that I initiated. You initiated it. I just tried to respond to you. I am agreeable to see this thread finished.
Zacharias 🐝 Voulgaris
2 years ago #5
I'm a consultant, not a charity. I think I've said enough. Cheers
Hitoshi Kokumai
2 years ago #4
Could you tell me where the right places can be found?
Zacharias 🐝 Voulgaris
2 years ago #3
Maybe you haven't been looking at the right place. The idea of a quantum proof cryptosystem has been floating since quantum computing became a real thing, yet only recently have cryptographers started to develop proper ciphers to address it. Innovation is slow in this field…
Hitoshi Kokumai
2 years ago #2
The idea of combining with steganography has been around since 2001 but we still do not find a meaningful application as yet.
Zacharias 🐝 Voulgaris
2 years ago #1
And if those images are used to stegsnographically conceal relevant information, this whole protoco can be part of a powerful cryptosystem. Just a thought…