Hitoshi Kokumai

10 months ago · 2 min. reading time · ~10 ·

Contact the author

Relevant Share Comment
Blogging
>
Hitoshi blog
>
Threat Bigger than Quantum Computer

Threat Bigger than Quantum Computer

The lock authenticates the key.
The key authenticates the lock.

  

Does the key authenticate
the person who holds it?

 

We today take up this report “NSA: We 'don't know when or even if' a quantum computer will ever be able to break today's public-key encryption”  https://www.theregister.com/2021/09/01/nsa_quantum_computing_faq/

Conclusion of this report: “In a world where users will divulge their passwords in return for chocolate or in response to an enticing phishing email, the risk of quantum computers might not be our biggest threat.”

Don’t be so reckless, however, as to jump to such a ridiculous conclusion that we would achieve a more secure world by dumping the password altogether. It would only be pathetically suicidal as examined here – “Remove the army and we will have a stronger national defense”  

“Expanded Password System

wane = Only I can select all of
BS] them correctly

Broader choices with both images and characters accepted

i

 

 

 

 

Easy to manage relenons between accounts and corresponding passwords.

&

Torturous login is history. Login is now comfortable, relaxing and healing

BO
250
08

The threat possibly bigger than the quantum computer is not the use of the password, but the non-use of the practicable password. Here is our solution –https://www.linkedin.com/posts/hitoshikokumai_mnemonic-identity-solutions-activity-6815444973333434368-prkp"> “Torturous login is history”  

Relation of Accounts & Passwords

   

* Unique matrices of images allocated to different accounts.

+ Ata glance you will immediately realize what images you should pick
up as your passwords for this or that account.

 

Key References 
 

Archive 2021— Comments Posted since January 2021 on Digital Identity and Threats to It

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Ifonlytextand fare OK [SUV BIOKUW

to memonze
text/number passwords

{Text Mode)
Recall the remembered
password

J 2

co-o0o

<veco N=

Ox ma

XxXBFr mow

<ozo>a

NAzZZIoaw
+

Low memory ceiling

to lighten the load of

text passwords

 

{Graphics Mode)
Recognize the pictures
remembered mn stones

 

High memory ceiling

 

[RE RET RSI

to make use of
memorized images

{Ongimal Picture Mode)

Recognize the unforgettable
pictures of episodic memories

sRBO yr
L@ S00

afson
fa

 

 

Very high memory cuiding

— Think ofall those adders you have to climb in Donkey Kong 1+)

 

Additional References


Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues 

 

Secret Credenti

 
   
 

Memories

Episodic Memory


 

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

aBEBK.png

 

#identity #authentication #password #security #biometrics #privacy #democracy #ethics #emergency #disaster #panic #defense #government #pandemic #teleworking #blockchain

Relevant Share Comment
Comments

More articles from Hitoshi Kokumai

View blog
8 months ago · 2 min. reading time

I would like to take up this somewhat puzzling report - “Google advises passwords are good, spear ph ...

9 months ago · 2 min. reading time

The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intellige ...

10 months ago · 2 min. reading time

https://aitechtrend.com/quantum-computing-and-password-authentication/ · My latest article titled ‘Q ...

You may be interested in these jobs