Author

Topic: Try out "Memory Key" - a tool to help generate passwords (suitable for all ages) (Read 1702 times)

legendary
Activity: 1792
Merit: 1008
/dev/null
How will you know if people tend to pick the same types of events, and, therefore, create big non-random clusters of choices that might be easily brute-forced?

Taking an idea from https://gist.github.com/3840286...

.... you could store a small number of bitcoin at private key = SHA256(memory_key), store the bulk of bitcoin at scrypt(Name+PIN+memory_key), and tell users to choose a new memory key if the SHA256(memory_key) coins are either ever spent or if that key ever gets funds from somebody else.

Because that means somebody else chose the same memory key.



nice one Smiley
hero member
Activity: 784
Merit: 1009
firstbits:1MinerQ
If you made this web page so you could seed it eg. when you access it (or when saved somehow) each choice is randomized then you could use this as a two-factor authentication. You would need the saved web page plus the knowledge to gain access since every other person should have a different randomized version of the page.
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
How will you know if people tend to pick the same types of events, and, therefore, create big non-random clusters of choices that might be easily brute-forced?

Of course that is probably the biggest weakness of this type of system (and despite warnings some people will just go ahead and use "where was I on 9/11") although I think perhaps a small amount of training would possibly help a lot.

.... you could store a small number of bitcoin at private key = SHA256(memory_key), store the bulk of bitcoin at scrypt(Name+PIN+memory_key), and tell users to choose a new memory key if the SHA256(memory_key) coins are either ever spent or if that key ever gets funds from somebody else.

Because that means somebody else chose the same memory key.

Good suggestion.
hero member
Activity: 900
Merit: 1000
Crypto Geek
Great to see.

For added bonus, make it for an event you would like to happen. You're basically creating a sigal, something from magick. Perhaps it will come true?! ;-)
legendary
Activity: 1652
Merit: 2311
Chief Scientist
How will you know if people tend to pick the same types of events, and, therefore, create big non-random clusters of choices that might be easily brute-forced?

Taking an idea from https://gist.github.com/3840286...

.... you could store a small number of bitcoin at private key = SHA256(memory_key), store the bulk of bitcoin at scrypt(Name+PIN+memory_key), and tell users to choose a new memory key if the SHA256(memory_key) coins are either ever spent or if that key ever gets funds from somebody else.

Because that means somebody else chose the same memory key.


legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
Another example, with the results after the equal sign (=) and in bold would be mine.

GENDER = M
NUMBER of Children and their sex = 3G2B (2 by marriage, 3 via Oops!)
ADDRESS (# + 1st Letter) = 406W
SS1 or SS1R (R=reversed) (the first 3 digits of a US SS #)
SS2 or SS2R (R=reversed) (the middle 2 digits of a US SS #) SS2R = 27
SS3 or SS3R (R=reversed) (the last 4 digits of a US SS #)
Birthday (using the first letter of the month and no 0's with exception of the year available in various formats for other countries) = M41960
BIBLE Verse = J11 (John 1:1)
YOUR Initials = BKJ (J = Jr.)

Thus, mine would be M3G2B406W27M41960J11BKJ
hero member
Activity: 952
Merit: 1009
Huh, this works pretty well

legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
A happy new years to all fellow Aussie Bitcoiners!

Let's hope that 2013 will bring us a local exchange for AUD that can be relied upon and has *volume*.

Smiley
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
Just worked out a great way for being able to narrow your time down to a quarter hour (rather than just picking morning or afternoon)- find a photo from one of your holidays where something you remember clearly happened either just before or afterwards (but was not documented in any way) and use the time that the photo was taken.

The hint would then be a clue to help you find the photo (so you can be sure to get be able to get the time and month exact) - even if someone worked out the photo the photo itself won't really give away anything other than the time (without having "been there").

Smiley
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
I like it, you should allow the user to throw in an extra blob of text to input though to make it more secure.  

Thanks - suggestion noted (and also I think that the last select could have quite a lot more added to it).

Other ideas I've also had were to include things like ISBN #'s for books or product codes (for DVDs, etc.) which would be included in some sort of bundled DB (as it needs to be used "offline") to try and make having to add anything "manually" hopefully unnecessary.

P.S.: I don't see Canada in there!  Cheesy

Sorry - haven't been there (yet) - but if we do end up starting up a project for this that will be right up there on the list!
legendary
Activity: 1190
Merit: 1000
www.bitcointrading.com
I like it, you should allow the user to throw in an extra blob of text to input though to make it more secure. 

P.S.: I don't see Canada in there!  Cheesy
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
I know the combinations make it hard to bruteforce, but someone close to the target might have most of information handy - the region and event for example. Just another part of security I would say.  Cheesy

Of course a big part of the strength of a "memory key" must be that it is derived from an event that is very personal (i.e. don't pick "where was I on 9/11?" as the "hint" you would keep written down to reconstruct your key but instead pick something like "what was the color of that crazy dog that I threw a rock at?"). Even better use an event that *only* you know about (could even be one that happened in a dream or nightmare).

Another feature I would suggest is the use of icons/photos as question choices to help facilitate memory retention. Seems easier for older people where their memory is like a sieve.

Yup - indeed I was thinking along the same lines (in another thread) - I think if others are interested in working on this then I might create a project for it on CIYAM Open and help fund it.

Even elderly people with early dementia typically can remember childhood and adolescent memories quite well (so generally it would be a good idea for the more senior end users to tap into their older more stable memories).
legendary
Activity: 1288
Merit: 1227
Away on an extended break
...
In regards to the brute forcing please check out just how many options there already are (the # of combinations possible is already huge and of course those options with less than 100 entries could be expanded so that it ends being equivalent to a traditional 12 character password) - also note that I plan to use this in combination with a small traditional password (or PIN) and to perform key hardening using an algorithm such a scrypt (and likely will be holding another competition to give it a real world *test*).


I know the combinations make it hard to bruteforce, but someone close to the target might have most of information handy - the region and event for example. Just another part of security I would say.  Cheesy

Another feature I would suggest is the use of icons/photos as question choices to help facilitate memory retention. Seems easier for older people where their memory is like a sieve.
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
OMG Malaysia's actually listed!  Shocked

Yup - I have been there (at this stage it is a very personalised implementation although I have put some things in that are not from my real life).

I noticed that a single change in the options does not change the entire code generated - i.e. 'avalanche effect'. Maybe V2 will impose elements like this? It's easy to identify the code as being generated by your website currently, and a bruteforce might be possible.

Yup - the script could be improved (this was just a sneak peek really to get some feedback) and of course the key could always be hashed.

In regards to the brute forcing please check out just how many options there already are (the # of combinations possible is already huge and of course those options with less than 100 entries could be expanded so that it ends being equivalent to a traditional 12 character password) - also note that I plan to use this in combination with a small traditional password (or PIN) and to perform key hardening using an algorithm such a scrypt (and likely will be holding another competition to give it a real world *test*).
legendary
Activity: 1288
Merit: 1227
Away on an extended break
OMG Malaysia's actually listed!  Shocked
I noticed that a single change in the options does not change the entire code generated - i.e. 'avalanche effect'. Maybe V2 will impose elements like this? It's easy to identify the code as being generated by your website currently, and a bruteforce might be possible.
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
After some brainstorming about this whole difficult passphrase and keeping it safe I have come up with the following:

http://ciyam.org/memory_key.html

Please note that the form doesn't actually post anything to my or any other website and of course it can be run offline.

Smiley

R21L03A251E16Y72D03E13O122X21R19F31Z34
Jump to: