I referred to ‘on-the-fly’ key regeneration in my
earlier post “Cryptography and Expanded Password System” - https://www.linkedin.com/posts/hitoshikokumai_identity-authentication-password-activity-6678120452411531264-tfCF
The core logic is so simple and plain that this non-technology
man was able to come up with overnight. I do not think it needs to be kept
confidential.
Each image is represented by a very long identifier
data. The entropy of the identifier data
summed up out of the several images the use picks up is very high to the extent
that it works as the seed for generating unique encryption key.
Once the key gets generated and used for encryption,
the seed and key will be eliminated while the software program remembers the
formula for calculation.
For decryption, the user picks up the correct images,
the identifier data getting summed up to generate the seed, which will be put
into the formula to calculate the key.
The seed and key will be eliminated once the decryption is over.
For actual implementation, some mathematical tweaks
are added for obfuscation. For
asymmetric cryptography, some more tweaks are incorporated.
Comments
Post a Comment