A simple authentication by common strings

نویسنده

  • Yoshihiro Teraswa
چکیده

It was the problem of finding the minimum value of the sum of the distances of the path through all cities Overview TSP. We propose an authentication with the problem that the deformation sum of the distances of the path to be a constant value. In this document, it is intended to construct an authentication function robust implementation is easy and the Blog. After it was shown that the first, to determine the replacement group and path are the same, we propose the authentication method to consider the deformation of the traveling salesman problem in the directed graph, using a sequence of bytes. Instead of providing illumination mathematically rigorous, describes a verifiable algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points

Received Feb 21, 2017 Revised Jun 26, 2017 Accepted Jul 19, 2017 Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new auth...

متن کامل

SASLprep: Stringprep Profile for User Names and Passwords

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes how to p...

متن کامل

Improving Usability Through Password-Corrective Hashing

We propose a way to increase the usability of password authentication systems by compensating for transposition and substitution errors. We show how to correct for these errors with low false positive rates (i.e., low probability that an arbitrary string will be accepted as the password for authentication). Thus our techniques increase usability with provably little loss of security. In particu...

متن کامل

Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP

Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words...

متن کامل

Authentication Protocols making use of Context free Grammar: Guessing Strings

Until now context free grammars (CFG) have been used mainly for the design of programming languages. There have been several studies, which demonstrate the relationship between learning theory and number theory. This paper presents protocols, which use context free languages for an authentication protocol using one-time authentication information. This authentication information can be used for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1310.5670  شماره 

صفحات  -

تاریخ انتشار 2013