Using Hamiltonian Totems as Passwords

نویسندگان

  • Hervé Chabanne
  • Jean-Michel Cioranesco
  • Vincent Despiegel
  • Jean-Christophe Fondeur
  • David Naccache
چکیده

Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords are subject to brute force and shoulder surfing attacks, while users are reluctant to use biometrics for identification, due to its intrusiveness. This paper uses Hamiltonian tokens as authentication means. The proposed token structure offers many possible configurations (i.e., passwords) and is small enough to be carried on a physical keychain. After presenting our general idea, we describe an efficient algorithm to produce these tokens. Our procedure was validated by running a recognition campaign on a wide batch of synthetic samples, and experimented on prototypes manufactured using a commercial 3D-printer.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Sensitivity Analysis of Fiber-Reinforced Lamina Micro-Electro-Mechanical Switches with Nonlinear Vibration Using a Higher Order Hamiltonian Approach

In this paper, the nonlinear free vibration of fiber-reinforced lamina micro-switches is investigated, and a sensitivity analysis (SA) is given. The switches are modeled as solid rectangular beams consisting of an isotropic matrix with transversely and longitudinally isotropic reinforcements, incorporating a higher order Hamiltonian approach. An SA of the proposed micro-switch is presented by c...

متن کامل

epl draft The weak password problem : chaos , criticality , and encrypted p - CAPTCHAs

Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design an algorithm that strengthens security of passwords. The core idea of our method is ...

متن کامل

Symmetry group, Hamiltonian equations and conservation laws of general three-dimensional anisotropic non-linear sourceless heat transfer equation

‎In this paper Lie point symmetries‎, ‎Hamiltonian equations and conservation‎ ‎laws of general three-dimensional anisotropic non-linear sourceless heat transfer‎ ‎equation are investigated‎. ‎First of all Lie symmetries are obtained by using the general method‎ based on invariance condition of a system of differential equations under a pro‎longed vector field‎. ‎Then the structure of symmetry ...

متن کامل

Text, Talk and Totems: the Discursive Constitution of the Strategy Process

Text, Talk and Totems: The Discursive Constitution of the Strategy Process The efficacy of processual analysis in the study of micro-strategizing is well established. In this paper we will seek to contribute to the strategy as process debate by introducing a discourse perspective. We will argue that such an approach offers an analytically fruitful means of studying the way in which strategies a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013