TED Conversations

This conversation is closed.

Passwords can become 70% more Effective

Passwords currently lock a system from a hacker. But what I propose is the use of "large primes" that unlock the password for the user, the keys only known by the user----not stored in the computer---and the keys initially generated by
simply English phrases the user can remember. Thus, the password, a composite---even if known by the hacker can not be unlocked as it would be a huge composite unfactorable. If "Alice" types in "Eddie ate tickets in 733." And "Joe lives for marshmallows." The PC would generate two large primes to represent each message and create the password---an immense compposite number. Assuming no key logger was watching, the PC was clean. Eve who listens in later and gets the password can't break it because the English phrases and the prime equivalents were not stored, only the composite, which Eve can't break. Alice breaks it later to get into her machine by typing in the phrases and the machine finds that these are the two primes and unlocks her machine.


Showing single comment thread. View the full conversation.

  • Dec 2 2012: Lesley: How do we make a password too hard for a hacker but easy for the nervous user? The password must be an immense number that can only be factored by 2 primes ( that are huge also)...only two numbers will work and no algorithm helps the hacker solve it in weeks let alone minutes. But how is this going to be easy for the user? The two primes represent two small phrases only the user knows. Each letter represents a variable digit that gets locked and the number of letters generates the iterations and the number of words further complicates it internally so that the small phrase might generate a 40 digit prime (Fermat formula). Even if the hacker were to know all of these algorithms he still doesn't know the original English phrase so...he is lost. This password revolution means no longer does it unlock; instead the password now has to be unlocked.

Showing single comment thread. View the full conversation.