Comments on Gridsure Authentication

ثبت نشده
چکیده

I dispute the worth of Professor Weber's analysis. Whilst his mathematical calculations in themselves I'm sure are flawless, there are a number of tacit assumptions made that undermine its meaningfulness, mainly about the psychology of choice of patterns. Weber first selects a set of "likely to be chosen" shapes, including lines, ticks and boxes. On what basis is it argued that users are likely to pick these shapes? Intuitively we might want to believe that squares, lines, ticks are all common, but it psychology results often defy intuition and need to be properly researched. Secondly, Weber assumes that all alignments of common shapes are equally likely to be chosen, for example that a four digit line running from left to right could start from the second column as well as the first. Beyond this, the combinatorics clearly say nothing about the relative likelihood of different patterns actually being chosen. So if we were to accept his assertion that there are 11,640 common patterns on the grid, it still is of huge significance that some of these patterns are more common than others. So the results of this report rely on psychology assumptions that Weber has not justified, and totally ignores the wider issue of relative probabilities of different shapes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comments on two multi-server authentication protocols

Recently, Tsai and Liao et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. But we found some security loopholes in each protocol. We will show the attacks on their schemes.

متن کامل

Comments on the S / KEY user authentication

We give a critical analysis of the security properties of the S/KEY user authen-tication system.

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Authentication and Delegation in Internet Aplications

The paper presents an overview of classical authentication schemes actually used on the internet. It shows that they are not suitable for an environment where Delegation is needed and presents public key cryptography as a option for the use of Delegation. It ends with some comments on X.509 and further extensions.

متن کامل

Comments on a password authentication and update scheme based on elliptic curve cryptography

School of Mathematics and Statistics, Wuhan University, Wuhan, People’s Republic of China Email: [email protected] Abstract: The security of a password authentication and update scheme based on elliptic curve cryptography proposed by Islam et al. [S.K. Hafizul Islam, G.P. Biswas, Design of improved password authentication and update scheme based on elliptic curve cryptography, Mathematical and C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008