Pass-algorithms: a user validation scheme based on knowledge of secret algorithms

  • Authors:
  • James A. Haskett

  • Affiliations:
  • Indiana Univ., Bloomington

  • Venue:
  • Communications of the ACM
  • Year:
  • 1984

Quantified Score

Hi-index 48.25

Visualization

Abstract

A superset of the secondary passwords technique, pass-algorithms provide enormous flexibility and ease of implementation and represent an attractive alternative to more costly systems security features and equipment. The method validates users who demonstrate knowledge of a secret algorithm rather than a password.