- ...Perrig
- This publication was supported in part by Contract Number
102590-98-C-3513 from the United States Postal Service. The contents of
this publication are solely the responsibility of the author and do not
necessarily reflect the official views of the United States Postal
Service.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...(PIN)
- By secure passwords or secure
PINs we mean strings which have no immediate meaning or relationship with the person. Therefore
an attacker will have difficulties in guessing it.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...strings
- We use meaningless from the point of view of the user. The hash value, or
fingerprint of a public-key certificate has a purpose for the program, but no understandable
meaning for the user.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...[#blum:bbs##1#].
- The original Random Artversion used in this paper does not use this
scheme, but it would be a simple addition.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...likely
- This does not really hold for Random Art, but it gives an estimation of the lower
bound.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.