Johnny can obfuscate: beyond mother's maiden name

  • Authors:
  • William Cheswick

  • Affiliations:
  • Lumeta Corp.

  • Venue:
  • HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Challenge/response authentication is stronger than password authentication, but has traditionally required a device for computing the challenge. Though human computation is limited, people can compute simple responses to challenges. If the challenge and the corresponding response is obfuscated with decoy information, an authentication scheme might be strong enough for a number of applications. The signs used in major league baseball provide some interesting techniques for obfuscation.