Hitoshi Kokumai

4 years ago · 2 min. reading time · ~10 ·

Blogging
>
Hitoshi blog
>
‘Manual Attack’ as against ‘Automated Attack’

‘Manual Attack’ as against ‘Automated Attack’

O-

o%

-Q-

I was recently challenged with this question – “Selection of several images on a matrix of 36 images, for instance, would only give the level of mathematical strength that a long PIN provides. Is it any better than using long PINs?”
 
Our answer is “We could consider the threats of 'visual-manual attacks on display' and 'automated attacks' separately, say, we should be able to think of the measures to cope with them separately.
 
A figure of ’20-bit’, for instance, would be just a bad joke against automated attacks, whereas it would make a pretty tall wall against visual-manual attacks on display, particularly when the positions of images are shuffled on each trial.
 
Try the image-to-code conversion at our new website and you will see what kind of mathematical strength your image memory can generate/regenerate against automated attacks - https://www.mnemonicidentitysolutions.com/

Many more questions are answered in “Questions and Answers - Expanded Password System and Related Issues”

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

Key References 
 

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

A

 

 

 

It's a no

Additional References
 

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

Secret Credenti

 
   
 

Memories

Episodic Memory


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

7isRd.png
ieigl.
Comments

Zacharias 🐝 Voulgaris

3 years ago#7

Hitoshi Kokumai

3 years ago#6

Zacharias 🐝 Voulgaris

3 years ago#5

Hitoshi Kokumai

3 years ago#4

Zacharias 🐝 Voulgaris

3 years ago#3

Hitoshi Kokumai

3 years ago#2

Zacharias 🐝 Voulgaris

3 years ago#1

And if those images are used to stegsnographically conceal relevant information, this whole protoco  can be part of a powerful cryptosystem. Just a thought…

Articles from Hitoshi Kokumai

View blog
3 years ago · 3 min. reading time

Today's topic is “Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of cr ...

3 years ago · 2 min. reading time

I got interested in this article -on the password problem · “Tech Q&A” · https://www.unionleader.c ...

3 years ago · 2 min. reading time

Our password headache may well be the consequence of these dual causes - · ‘Use of Impracticable Pas ...

Related professionals

You may be interested in these jobs


  • JR United Kingdom Worcester, England, United Kingdom

    Attack Surface Management and Automated Red Teaming Platform · We are partnering with a VC-backed client who specializes in providing real-time visibility into an organization's attack surface and potential exploitable vulnerabilities. · Their platform has received numerous award ...


  • beBee Careers Knutsford

    Job Summary: · We are seeking a highly skilled Transformation Lead to join our team. As a Transformation Lead, you will play a key role in driving the company's technology and commercial strategy. You will lead the development and implementation of infrastructure solutions to sup ...


  • Ripple London, England, United Kingdom

    Senior Security Engineer, Detection and Response · Ripple is building a world where value moves like information does today. · We are improving the global financial system and creating greater economic fairness and opportunity for more people, in more places around the world thro ...