TED Conversations

This conversation is closed. Start a new conversation
or join one »

Passwords can become 70% more Effective

Passwords currently lock a system from a hacker. But what I propose is the use of "large primes" that unlock the password for the user, the keys only known by the user----not stored in the computer---and the keys initially generated by
simply English phrases the user can remember. Thus, the password, a composite---even if known by the hacker can not be unlocked as it would be a huge composite unfactorable. If "Alice" types in "Eddie ate tickets in 733." And "Joe lives for marshmallows." The PC would generate two large primes to represent each message and create the password---an immense compposite number. Assuming no key logger was watching, the PC was clean. Eve who listens in later and gets the password can't break it because the English phrases and the prime equivalents were not stored, only the composite, which Eve can't break. Alice breaks it later to get into her machine by typing in the phrases and the machine finds that these are the two primes and unlocks her machine.


Showing single comment thread. View the full conversation.

  • Nov 24 2012: Mickey:

    That is why 70% effective. If your machine is clean, not being watched, then the hacker attacking looking in later may get the 256 bit password but not worth trying to unlock it but if you are typing and a key logger is inside, well that is the 30% time my idea doesn't help. The phrase Alice uses doesn't get logged so my idea is good most of the time. Unlocking, factoring because you know the phrase, is never logged.

Showing single comment thread. View the full conversation.