From: Nathan Loofbourrow <loofbour@cis.ohio-state.edu>
To: cypherpunks@toad.com
Message Hash: a81ef4d58b2a06450c1944d33ee48fe47e41a3ec2c8d1eaa72b4fce6b0ffc017
Message ID: <199510141243.IAA27588@hammond.cis.ohio-state.edu>
Reply To: <199510132226.PAA13627@jobe.shell.portal.com>
UTC Datetime: 1995-10-14 12:43:35 UTC
Raw Date: Sat, 14 Oct 95 05:43:35 PDT
From: Nathan Loofbourrow <loofbour@cis.ohio-state.edu>
Date: Sat, 14 Oct 95 05:43:35 PDT
To: cypherpunks@toad.com
Subject: Re: mental cryptography
In-Reply-To: <199510132226.PAA13627@jobe.shell.portal.com>
Message-ID: <199510141243.IAA27588@hammond.cis.ohio-state.edu>
MIME-Version: 1.0
Content-Type: text/plain
hfinney@shell.portal.com writes:
> I have read one paper which attempts to solve this problem, called "Human
> Identification through Insecure Channel". Unfortunately my papers are in
> a mess right now so I don't have the reference handy. It was by some
> Japnese researchers, published in one of the proceedings books. I
> believe a follow-on paper was published within the last year or two which
> had some improvements or corrections to their algorithm. Sorry to be so
> vague, I'll try to dig out more info over the weekend.
The article, by T. Matsumoto and H. Imai, was in Eurocrypt '91, which
is published as vol. 547 of "Lecture notes in computer science".
The only followup article I could find was:
C.-H. Wang, T. Hwang, and J.-J. Tsai, "On the Matsumoto and Imai's
[sic] human identification scheme." (LNCS 921, 1995)
> >I am sure better algorithms can be found for this purpose if mental
> >cryptography is made explicit as a design goal. Perhaps it should be?
>
> It's a hard problem to solve in general because you have only a human
> mind to do the identification algorithm but you have computers to try to
> break it. But I would like to see the problem get more attention.
It may be that the approach is off anyway. Credit cards have only
signature verification -- if the salesperson bothers -- because stolen
cards are reported. You don't need a strong authentication technique
if a stolen card is easy to cancel.
Of course, perhaps this encourages someone to steal your card and
incapacitate you before you can report it. That's why we have
PINs... so that someone can steal your card, threaten you until you
reveal your PIN, and then incapacitate you... Hmm...
Even with a weak PIN system for authentication, you can always provide
a "duress" PIN, right?
nathan
Return to October 1995
Return to “s1018954@aix2.uottawa.ca”