‘Manual Attack’ as against ‘Automated Attack’

I was recently challenged with this question – “Selection of several images on a matrix of 36 images, for instance, would only give the level of mathematical strength that a long PIN provides. Is it any better than using long PINs?”
Our answer is “We could consider the threats of 'visual-manual attacks on display' and 'automated attacks' separately, say, we should be able to think of the measures to cope with them separately.
A figure of ’20-bit’, for instance, would be just a bad joke against automated attacks, whereas it would make a pretty tall wall against visual-manual attacks on display, particularly when the positions of images are shuffled on each trial.
Try the image-to-code conversion at our new website and you will see what kind of mathematical strength your image memory can generate/regenerate against automated attacks - https://www.mnemonicidentitysolutions.com/
Many more questions are answered in “Questions and Answers - Expanded Password System and Related Issues”
![“Expanded Password System
wane = Only I can select all of
BS] them correctly
Broader choices with both images and characters accepted
i
Easy to manage relenons between accounts and corresponding passwords.
&
Torturous login is history. Login is now comfortable, relaxing and healing
BO
250
08](https://contents.bebee.com/users/id/13855668/article/manual-attack-as-against-automated-lrzHO1Piy0IT/VXmMx.jpeg)
Key References
Account Recovery with Expanded Password System
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History - Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform

Additional References
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers - Expanded Password System and Related Issues

< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes - narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space - "below-one" factor authentication

Articles from Hitoshi Kokumai
View blog
Today's topic is “Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of cr ...

I got interested in this article -on the password problem · “Tech Q&A” · https://www.unionleader.c ...

Our password headache may well be the consequence of these dual causes - · ‘Use of Impracticable Pas ...
Related professionals
You may be interested in these jobs
-
Junior Backend Engineer
11 hours ago
JR United Kingdom Worcester, England, United KingdomAttack Surface Management and Automated Red Teaming Platform · We are partnering with a VC-backed client who specializes in providing real-time visibility into an organization's attack surface and potential exploitable vulnerabilities. · Their platform has received numerous award ...
-
Infrastructure Architect Lead
1 week ago
beBee Careers KnutsfordJob Summary: · We are seeking a highly skilled Transformation Lead to join our team. As a Transformation Lead, you will play a key role in driving the company's technology and commercial strategy. You will lead the development and implementation of infrastructure solutions to sup ...
- Ripple London, England, United Kingdom
Senior Security Engineer, Detection and Response · Ripple is building a world where value moves like information does today. · We are improving the global financial system and creating greater economic fairness and opportunity for more people, in more places around the world thro ...
Comments
Zacharias 🐝 Voulgaris
3 years ago#7
I'm sure that with your open-mindedness and resources, we can work out a professional deal that would be mutually beneficial and help bring closure to this topic.
Hitoshi Kokumai
3 years ago#6
Steganography is not the subject that I initiated. You initiated it. I just tried to respond to you. I am agreeable to see this thread finished.
Zacharias 🐝 Voulgaris
3 years ago#5
I'm a consultant, not a charity. I think I've said enough. Cheers
Hitoshi Kokumai
3 years ago#4
Could you tell me where the right places can be found?
Zacharias 🐝 Voulgaris
3 years ago#3
Maybe you haven't been looking at the right place. The idea of a quantum proof cryptosystem has been floating since quantum computing became a real thing, yet only recently have cryptographers started to develop proper ciphers to address it. Innovation is slow in this field…
Hitoshi Kokumai
3 years ago#2
The idea of combining with steganography has been around since 2001 but we still do not find a meaningful application as yet.
Zacharias 🐝 Voulgaris
3 years ago#1
And if those images are used to stegsnographically conceal relevant information, this whole protoco can be part of a powerful cryptosystem. Just a thought…