A simple authentication by common strings
نویسنده
چکیده
It was the problem of finding the minimum value of the sum of the distances of the path through all cities Overview TSP. We propose an authentication with the problem that the deformation sum of the distances of the path to be a constant value. In this document, it is intended to construct an authentication function robust implementation is easy and the Blog. After it was shown that the first, to determine the replacement group and path are the same, we propose the authentication method to consider the deformation of the traveling salesman problem in the directed graph, using a sequence of bytes. Instead of providing illumination mathematically rigorous, describes a verifiable algorithm.
منابع مشابه
Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points
Received Feb 21, 2017 Revised Jun 26, 2017 Accepted Jul 19, 2017 Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new auth...
متن کاملSASLprep: Stringprep Profile for User Names and Passwords
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes how to p...
متن کاملImproving Usability Through Password-Corrective Hashing
We propose a way to increase the usability of password authentication systems by compensating for transposition and substitution errors. We show how to correct for these errors with low false positive rates (i.e., low probability that an arbitrary string will be accepted as the password for authentication). Thus our techniques increase usability with provably little loss of security. In particu...
متن کاملWiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP
Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words...
متن کاملAuthentication Protocols making use of Context free Grammar: Guessing Strings
Until now context free grammars (CFG) have been used mainly for the design of programming languages. There have been several studies, which demonstrate the relationship between learning theory and number theory. This paper presents protocols, which use context free languages for an authentication protocol using one-time authentication information. This authentication information can be used for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1310.5670 شماره
صفحات -
تاریخ انتشار 2013