Hitoshi Kokumai

3年前 · 3 分の読書時間 · ~10 ·

ブログ作成
>
ブログ Hitoshi
>
Expanded Password System: ‘Image-to-Code Converter’

Expanded Password System: ‘Image-to-Code Converter’


In my earlier post “"Global HQRegistered in UK",  I mentioned that people engaged in identity management or ‘deployment of authenticators’ could all be the down-stream partners for Expanded Password System (EPS).

Are you working in the fields of ID federations, two/multi-factor authentications, cryptographic solutions and other areas somehow related to identity management?

Then you might be interested to hear thatthe core of EPS is designed to convert images to high-entropy codes, which work as very long passwords and also as the seeds of symmetric or asymmetric cryptographic keys.

You will please keep watching us and wait for the completion of our 'Image-to-Code Converter' software module that you will be able to plug into your solutions.

Or, you could consider being more proactive and helping us accelerate the process in some way or other for making your EPS-powered solutions available to your customers speedily.

DED «0

RaHP
BOP v6
mee

gr |ar

Generating High-
Entropy Password like

xtyax9d4294dlelEYVz
wo/gadieowUx093/x7
?lwble84x09xloPxLxeo
dtyYDidex&&xeigo@y...

Theory and Implementation

 Expanded Password System, however solid the theory is, would be vulnerable to attacks when it is poorly implemented.

 Very fortunately, our first client in Japan who adopted Expanded Password System for 140,000 shoppers (designed for one million users) was extremely demanding about the good implementation. We had to satisfy them and actually satisfied them with the very solid implementation. The latest client is Japan's Self-Defense Ground Forces (aka Army). We naturally had to be very confident about the good implementation.

 What enabled us to design the good implementation is the guidance we were given by Emeritus Prof. Hideki Imai of Tokyo University, who was the chairperson of Japan’s CRYPTREC when we first met in 2001. He pushed my back to move ahead confidently with promotion of Expanded Password System, and helped me a lot with several joint research programs until he retired from Tokyo University.

 He emphasized to me repeatedly how critical it is to design the good implementation. First of all, hashing the credential data is an absolute must whether on line or offline. It is also from him that I came to know about Deffie-Hellman Key Exchange, Elliptic Curve Cryptography and so on.

 As such, we are fully certain that not only the solid theory but also the good implementation is indispensable to have Expanded Password System correctly valued by the security-centric corporations and organizations wherever we go. 

Who Adopted Expanded Password System (EPS) and for What

A telecom company who built a payment system designed for a million online shoppers adopted EPS for accepting ‘Hard-to-Forget’ and yet ‘Hard-to-Break’ credentials and for reducing the helpdesk cost drastically. Actually 140,000 online shoppers enjoyed the no friction login before the payment system was closed in 2008.

An IT corporation who built a security-conscious corporate network adopted EPS-based 2-channel/2-factor authentication accepting ‘Hard-to-Break’ and yet ‘Hard-to-Forget’ credentials. 1,200 employees are still enjoying the good balance of security and usability.-

Japan’s Self-Defense Ground Forces, aka Army, adopted our product for accepting ‘Panic-Proof’ and yet ‘Hard-to-Break’ credentials. The number of licenses has increased more than 10-fold over the 7-year period from 2013 and is set to increase further.

We expect to see similar adoptions in hundreds or thousands of times larger scale once we start the operation in the global market from the quarters in UK.

Cryptography and Expanded Password System

As mentioned earlier, Prof. Hideki Imai pushed my back to move ahead confidently in 2001 when he was the chair of Japan’s CRYPTREC. He repeatedly emphasized to me how critical it is to hash the credential data whether online or offline. It is also from him that I came to know about the topics of Deffie-Hellman Key Exchange, Elliptic Curve Cryptography, etc. Let me talk about the 2002 – 2004 joint research projects we progressed.

 Firstly, we tried the methodology of using the high-entropy credential data generated by Expanded Password System (EPS) as the seed of RSA key pair. With the scheme, the user's private key does not physically exist anywhere in the universe, but it can be re-generated on-the-fly out of the images that the user picks up for authentication for each login. It proved to work on the internet. At that time I was told we should look at Elliptic Curve Cryptography in the future as a successor to RSA.

 Thereafter, we took up the experiment of incorporating Expanded Password System into PAKE (simplified version developed at Tokyo University).We were able to demonstrate that it worked with no friction in the lab environment.

 Both projects were financed by Japan’s government agencies, Unfortunately, however, the officials who received our reports showed no interest in a budget to enable us to expand the experiments further. We might have started these forward-looking projects a bit too early.

< References >

 Proposition on How to Build Sustainable Digital Identity Platform

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Negative Security Effect of Biometrics Deployed in Cyberspace

Removal of Passwords and Its Security Effect

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues (30/June/2020)

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

< Latest Media Articles Published in 2020 Spring>

Digital Identity – Anything Used Correctly Is Useful https://www.valuewalk.com/2020/05/digital-identity-biometrics-use/

‘Easy-to-Remember’ is one thing ‘Hard-to-Forget’ is another https://www.paymentsjournal.com/easy-to-remember-is-one-thing-hard-to-forget-is-another/

Identity Assurance And Teleworking In Pandemic https://www.informationsecuritybuzz.com/articles/identity-assurance-and


コメント

Hitoshi Kokumaiの記事

ブログを見る
2年前 · 2 分の読書時間

The quantum computer held in a bad guy’s hand is indeed a big threat. So is the artificial intellige ...

2年前 · 2 分の読書時間

https://aitechtrend.com/quantum-computing-and-password-authentication/ · My latest article titled ‘Q ...

2年前 · 3 分の読書時間

I today take up this The Register report - “Client-side content scanning as an unworkable, insecure ...

この職種に興味がある方はこちら

  • 公開範囲1.等を含む求人情報を公開する

    フル給油アルバイト

    次の場所にあります: Talent JP C2 - 1週間前


    公開範囲1.等を含む求人情報を公開する Oirase, 日本 パート

    仕事内容 · ガソリンスタンドで、ガソリン給油及び関連カー用品の販売を行い · ます。冬は灯油の給油も行います。 · *地域密着の安定した仕事です。 · *未経験者も歓迎します。 · ◎株式会社アサヒ商会は、全国に50店舗あるガソリンスタンドの · 大手チェーン店です。 雇用形態 パート労働者 正社員登用の有無 なし 派遣・請負等 就業形態 派遣・請負ではない 雇用期間 雇用期間の定めなし 就業場所 〒 青森県上北郡おいらせ町高田79-1 · 「おいらせ給油所」 受動喫煙対策 あり(屋内禁煙) ...

  • ABC-MART GrandStage 横浜西口店

    abcマートのアパレル販売スタッフ / 地域限定

    次の場所にあります: Talent JP C2 - 3日前


    ABC-MART GrandStage 横浜西口店 Shibuya City, 日本

    仕事内容 · ご自宅から通える範囲の店舗で接客をお任せします。私たちが接客販売で大事にしているのは、「商品の購入」ではなく、シューズを買いたいと思った目的を叶えて「満足していただくこと」。そのためにきちんとお話を聞く姿勢を大切にしています。地域のお客様に何度も来てもらえるお店を一緒につくりましょう ●初めてでも安心♪ 入社いただいた方には教育担当がついて、イチから教えていきます。お客様への接客・販売を経験の中でわからないことはすぐに解決できるよう先輩スタッフがしっかりフォロー 他にも、入社後60日間は、先輩との間で交換日記のようなツールを使って、日々の ...

  • ACT ENGINEERING

    改修工事の土木工務・事務/東京都江東区

    次の場所にあります: Talent JP C2 - 3日前


    ACT ENGINEERING Koto City, 日本

    INTRODUCTION · アクトエンジニアリングの業務サービス · 安全教育コンテンツ/労働災害防止 · 海外事業 · ITソリューション · 施工計画 · 建設人材 · 人材育成 · CORPORATE PROFILE · 会社概要 · 会社沿革 · アクセスマップ · RECRUIT · 新卒採用情報 · 社員インタビュー · 教育システム · 職種紹介 · 福利厚生・募集要項 · エントリー · キャリア採用 · OTHERS · お問い合わせ · 個人情報保護方針 · 労働派遣事業に関する情報公開について · ...