Hitoshi Kokumai

1 week ago · 2 min. reading time · visibility ~10 ·

chat Contact the author

thumb_up Relevant message Comment

Publishing by aiTech Trend

DED

RDaDHP
BOP v6
mec Ne

gr |ar

Generating High-
Entropy Password like

xtyax9d4294dlelEYVz
wo/gadieowUx093/x7
?lwble84x09xloPxLxeo
dtyYDidex&&xeigo@y...

https://aitechtrend.com/quantum-computing-and-password-authentication/

My latest article titled ‘Quantum Computing and Password Authentication’ was published by NY-based aiTech Trend.  https://aitechtrend.com/ Below is the gist.

-Quantum computing, however powerful, cannot place our volition and memory under its control. Conversely our volition and memory could help force quantum computing to work just for benefitting people.

-Removal of the password would bring catastrophic disasters.

-Our password headache may well be the consequence of ‘Use of Impracticable Password’ and ‘Non-Use of Practicable Password’

-It’s feasible to bring a healthy second life to legacy password systems

-We are coming up with a Password Manager powered by Expanded Password System that enables us to make use of our pleasant episodic image memory as the solid secret credentials.

-Expanded Password systems will continue to contribute to safe cyberspace even when quantum computing has destroyed the part of identity authentication that depends on public-key schemes.

By the way, what we say about Quantum Computing can also be said about Artificial Intelligence.

Assume that we (and our descendants) are put into an AI-dominated world. The last bastion that we are able to rely on for protecting us from the perils of uncontrolled AI would be our volition and memory that will continue to stay outside the realm of the AI.

Attempts to kick out our volition and memory from digital identity and identity assurance would only be insanely suicidal.

Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.

Key References 


 Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)

Additional References


Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

rfeY6.jpeg


 

thumb_up Relevant message Comment
Comments

More articles from Hitoshi Kokumai

View blog
10 hours ago · 2 min. reading time
Hitoshi Kokumai

Truly Big Threat

The quantum computer held in a bad guy’s hand is i ...

1 week ago · 3 min. reading time
Hitoshi Kokumai

Serious Funny Reality

I take up this new report today - “Researchers Def ...

3 weeks ago · 3 min. reading time
Hitoshi Kokumai

Leak-resistant Secret Credentials

Today's topic is “Microsoft Exchange Autodiscover ...