阴阳 五行 块之 一: 根基 济灵 f 月 之 f 月
MEMORIZABLE PUBLIC-KEY CRYPTOGRAPHY
(MePKC) & ITS APPLICATIONS
1111111
1166611
1611161
1166611
1116611
1116611
1116611
1116611
1666611
1116661
1666611
1111111
Mainly authored by Kok-Wah LEE (李 国华) @ Xpree Li, plus
some ASCII arts of 2D key authored by Wei-Dong Chui (徐 伟栋) & Wei-Jian Chui (徐 伟坚)
Unpublished Copyright © since the First Draft on 25 October 2008 in Malaysia
Publication Copyright © since the First Edition (version 1.0) on 14 March 2009 in the USA
Copyright Statement
The copyright of this book (aka "thesis" due to its role as a collection of
statements and theories put forward and supported by arguments) belongs to the
authors under the terms of the primary US Copyright Act in which it is firstly
published online from a computer server located in the United States of America,
secondly Malaysia Copyright Act 1987 due to author residency and citizenship, as
well as tertiary Berne Convention for all its signatory countries for any international
copyright entitlement.
Due to the relatively high research costs invested by the author, for refund, as
well as for building up a fund for further maintenance, research and development,
any original and novel idea conceptions from the author in this book is only free of
usage for public interests, press report, private study, research, and teaching
throughout the World, with the condition that proper originality citation for source
references has been clearly shown. Yet for any commercial usage, prior consent has
to be obtained from the author or his successor(s).
© Kok-Wah Lee @ Xpree Jinhua Li, 14 March 2009
Email: E96LKW@hotmail.com
URL (h): www.geocities.com/xpree/
URL (o): www.xpreeli.com
All rights reserved
ii
DECLARATION
I hereby declare that the original and novel idea conceptions in this book of research
essays towards a future possible doctorate thesis in information engineering,
generally, and information security, particularly, have all been done by me, except
Appendix B to have some new and creative child-made ASCII arts by Wei-Dong
Chui and Wei-Jian Chui.
李国华 @ 李锦华
Kok-Wah Lee @ Xpree Jinhua Li
Find me Xpree or Xpreeli in the Internet!
Email (Home): E96LKW@hotmail.com
Email (Business): contact@xpreeli.com
URL (Home): www.geocities.com/xpree/
URL (Business): www.xpreeli.com
First unpublished draft on 25 October 2008 in Malaysia
First edition (version 1.0) of online publication on 14 March 2009 in the USA
in
ACKNOWLEDGEMENTS
I hereby would like to express my gratitude to the following persons together with
their inputs that have been given me in completing the electronic book of this PhD
research project, which has contributed mainly in the novel knowledge field of
key/password security leading to the memorizable public-key cryptography
(MePKC) and its applications. Here are the listees:
(i) My parents, relatives and friends together with those anonymous people
- For help and giving me the physical, emotional and spiritual supports.
(ii) Lake-Tee Khaw, University of Malaya, Kuala Lumpur, Malaysia
- For giving the advantages and disadvantages of SD (Statutory Declaration).
(iii) Gita Radhakrishna, Multimedia University, Melaka, Malaysia
- For supplying the legal contents about copyright.
(iv) Alan Wee-Chiat Tan, Multimedia University, Melaka, Malaysia
- For supplying C++ class of big number arithmetic after my given idea; and
- Being a nominal supervisor since lb August 2008 till now.
(v) Voon-Chet Koo, Multimedia University, Melaka, Malaysia
- For prototyping the RJ45 switch using conventional DIP switch.
(vi) Hong-Tat Ewe, Multimedia University, Cyberjaya, Malaysia a
- For being a nominal supervisor since 27 May 2004 till 15 August 2008; and
- For having lots of unpleasant and trust-less interactions.
(vii) Matt Bishop, University of California at Davis, CA, USA
- For supplying a proceedings paper.
(viii) Alex X. Liu, Michigan State University, MI, USA
- For supplying a journal paper.
(ix) Chee-Onn Chow, University of Malaya, Kuala Lumpur, Malaysia
- For supplying a journal paper.
iv
DEDICATION
特将这 本 研究 论文书 献给于 我 敬 爱的父 亲李厚 芳和母 亲徐亚 妹。
This oook or research essavs is dedicated to my respected and beiovea parents,
Hew-Fong Lee and Ah-Mooi Choi.
H-( A _ A )-H
Find me Xpree or XpreeLi in the Internet!
CN: 语言与 文字 是 了解 ー个 文化的 终极 密码。
EN: Language and Writing are ultimate keys to understand a culture.
MY: Bahasa dan Tulisan adalah kunci terdasar to memahami satu ketamadunan.
V
ABSTRACT
The acquisition of a doctorate research degree is qualified by the sufficient and
novel knowledge contribution from a PhD postgraduate student. Generally, the
contribution of a scientific researcher is based on the publication counting, credit of
journal and proceedings, citation counting, qualified peer evaluator, and contribution
impact. Lately, D. L. Parnas (2007) called for a more accurate evaluation of
researcher's contribution instead of the publication counting and citation counting.
Parnas suggested that a researcher should provide some of one's main papers to be
evaluated by some qualified peer evaluators. Here, proposal is delivered to improve
Parnas' suggestion, where the researcher shall also list out the impacts of one's
selected papers like the successful implementation and realization of a research result
for public usage and application. This step of emphasizing researcher evaluation based
on contribution impact is crucial to the welfare of human civilization to avoid the
number game of discussing a war on some plain papers. Subsequently, this PhD
project is carried out based on this evaluation principle of contribution impact, where
the prototypes are expected to be realized and/or commercialized for public usages.
The main knowledge contributions of this research project are some key
management techniques to create big and yet memorizable secret(s), especially 2D
key, memorizable public-key cryptography (MePKC), and their applications in
information engineering. Password the secret is the most popular, easily compatible,
and cost-effective computer authentication method. In the current prior art, a
memorizable secret reaches a maximum size at 128 bits (Schneier, 2006). This has
limited the AES (Advanced Encryption Standard) key at 128 bits and storage
technology of private key to be in the forms of encrypted private key, split private key
(Ganesan, 1996, September 17), and roaming private key (Baltzley, 2000, November
28).
Here, the invented big secret creation methods and systems are (i) self-created
signature-like Han character of CLPW (Chinese Language Password) and CLPP
vi
(Chinese Language Passphrase), (ii) two-dimensional key (2D key), (iii) multilingual
key, (iv) multi-tier geo-image key, (v) multi-factor multimedia key using software
token, and their hybrid combinations. From every one of these inventions, the AES-
256 key can be realized as well as the other applications in information engineering
needing a big secret. Yet the most important contribution is the realization of fully
memorizable private key towards the MePKC using finite field cryptography (FFC),
elliptic curve cryptography (ECC), hyperelliptic curve cryptography (HECC), or
torus-based cryptography (TBC). The explanation here adopts 2D key and
multilingual key to create a fully memorizable private key for ECC. To resist the
demand for longer key size due to the advancement of computing technologies, key
strengthening is used.
Multimedia semantic noises are studied. Textual semantic noises like
capitalization, punctuation marks, misspelling, mnemonic substitution, permutation,
character stuffing, and ASCII mutual substitution table, are proposed to increase the
randomness of CLPW, CLPP, and 2D key. The available styles of 2D key are
multiline passphrase, crossword, ASCII art, Unicode art, etc.
Due to the technical and legal factors, there are different asymmetric key pairs
for different cryptographic schemes. Hence, there are many private keys to be
supported. From Forrester Research (Kanaley, 2001), an active Internet user manages
an average of 15 keys on a daily basis. However, Adams and Sasse (1999) reported
that users could only be expected to cope with a maximum of 4 or 5 keys that are
unrelated and regularly used. If one key is used for two or more accounts, there is a
risk of domino effect (Ives, Walsh & Schneider, 2004). Hence, the key management is
a balance issue of usability and security. There exist some methods to generate
multiple slave keys (aka site key) from one master key for multiple online accounts by
using the domain name, random number, single sign-on server, ana key strengthening.
Here, some new key management methods are proposed to extend the generation of
slave keys from one master key to both the online and offline accounts, which is called
multihash key, by using domain name, key strengthening, and hash truncation. A
Vll
brother of multihash key called multihash signature, using multiple hash values of a
message from different hash iteration, is proposed to provide object-designated
signature function. The object may be recipient, action, feature, function, meaning,
etc., as a representation.
Annually, the World and USA lose USD$600 billion and USD$250 billion,
respectively, due to economic espionage (Burgess & Power, 2008). The MePKC
secures the computer communications of an electronic file over an insecure channel
and an encrypted local file in the computer. However, only the ciphertext is protected
and not the decrypted plaintext. Sometimes, the acquisition of many ciphertexts by an
attacker through the pervasive hacking can be in favour of the attacker for ciphertext-
only attack, which is especially effective for the cracking of digital signature. The
current technique to resist hacking by using firewall is effective at the server side due
to experienced network administrator, but not at the client side due to the technical
difficulties and financial cost. Here, a simple method and device using DIP (Dual In-
Line Package) switch is proposed to secure a hacking-free data storage for common
end users.
MePKC can be applied to digital timestamping scheme. Humans are needed to
hold the private key in the form of fully memorizable secret and not the computing
devices. The legal case of laser inventor Gordon Gould (Taylor, 2002), which lasts for
30 years, has informed us the weaknesses of IP proving method using SD (Statutory
Declaration). Here, MePKC timestamping scheme can be used as the evidence for
general IP (Intellectual Property) like patent and copyright. This is especially effective
for the first-to-invent patent filing system. Today, all the countries in the world are
using first-to-file patent filing system, except the US is still using the first-to-invent
patent filing system. To resist the hacking threats, a limited first-to-invent patent filing
system is proposed. It has a window filing period of one year from the claim of a
timestamp, and uses the timestamp to prove the IP originator(s). Ruth Taplin (2004)
reported that IP assets in 2004 accounted for up to 70% and 40% of market values of
all corporate assets in the US and Japan, respectively. Tms reflects the truth that the
vm
developed countries are now relies heavily on the knowledge economy, where IP is
the main pillar. It also tells the crucial importance to apply MePKC timestamping
scheme.
As a whole, the current and other applications of big and yet memorizable
secret are as follows:
(i) methods and systems to realize memorizable symmetric key the secret
till resistance to quantum computer attack;
(ii) methods and systems to realize memorizable public-key cryptography
(MePKC);
(iii) methods and systems to improve security strength of other
cryptographic, information-hiding, and non-cryptographic applications
of secret beyond 128 bits;
(iv) method and system to harden the identification of embedded data in
steganography although stego-data has been detected;
(v) method and system to transfer fund electronically over a remote
network using MePKC;
(vi) method and system to license software electronically over a remote
network using MePKC;
(vii) methods and systems to authenticate human-computer and human-
human communications at a local station or over a remote network
using MePKC;
^vm) method and system to use digital certificate with more than one
asymmetric key pair for different protection periods and password
throttling;
(ix) method and system to use three-tier MePKC digital certificates for
ladder authentication;
(x) method and system to store, manage, and download voice and video
calls of mobile phone and wired phone at online distributed servers;
(xi) method and system of multipartite electronic commerce transactions;
as well as
ix
(xii) method and system to boost up the trust level of MePKC digital
certificate by using more than one certification authority (CA) and/or
introducer of trust of web.
In a nutshell, some new key management techniques are invented. These
techniques are used to create human-memorizable big secret(s) and further to realize
the MePKC and its applications. The secure hacking-free DIP switch and the
proposed limited first-to-invent patent filing system are hoped to be adopted
prevailingly and pervasively to resist the economic espionage through virtual hacking.
In the long run, the MePKC is expected to be fully utilized to create and promote an
environment-friendly and electronically networked info-computer era as for the e-
commerce communication to be upgraded from bipartite into multipartite
crypto system.
100
Figure 0.1a Multiline passphrase
linn
111111
— — li—
—li—
—li—
111111
linn
102
Figure 0.1c ASCII art
HAPPY ᅮ
M^INCH
SPELLS
ᄉ \ 껴
101
figure 0. lb Crossword
¥¥¥¥¥
©©¥©©
©©¥©©
©©¥©©
¥¥¥¥¥
103
figure O.ld Unicode art
Figure 0.1 Two-dimensional (2D) key
Keywords: Key/password security, big secret(s) creation methods, 2D key,
memorizable public-key cryptography (MePKC), multihash key, multihash signature.
X
TABLE OF CONTENTS
TITLE i
COPYRIGHT STATEMENT ii
DECLARATION iii
ACKNOWLEDGEMENTS iv
DEDICATION v
ABSTRACT vi
TABLE OF CONTENTS xi
LIST OF TABLES xviii
LIST OF FIGURES xx
PREFACE XXV
CHAPTER 1: OVERVIEW 1
1 . 1 Introduction 1
1.2 Motivation 1
1.3 Research Aims 3
1.4 Research Methodology 4
1.5 Organisation of the Thesis 4
CHAPTER 2: EVALUATION ON KNOWLEDGE CONTRIBUTION 7
2.1 Life of Research Postgraduate Students 7
2.2 General Conditions to Get a Doctoral Degree 7
2.3 Prior Approaches of Research Evaluation 8
2.4 Contribution Impact 9
2.5 Research Quality 12
CHAPTER 3: CREATING BIG MEMORIZABLE SECRET (PART 1) 17
3. 1 Required Protection Periods and Their Key Sizes 17
3.2 Review of the Secret for Symmetric Key Crypto system 20
3.2. 1 Related Work: Single-Line Key/Password Field 22
xi
3.3 Review of the Secret for Asymmetric Key Crypto system 22
3.4 Potential Methods to Create Big and Yet Memorizable Secret 25
3.5 Methods and Systems to Create Big Memorizable Secret 27
3.6 Potential Applications of Available Big Memorizable Secret 27
3.7 Future Development of Keys the Secret 29
CHAPTER 4: CREATING BIG MEMORIZABLE SECRET (PART 2) 31
4. 1 Passphrase Generation Methods 3 1
4.1.1 Acronym 3 1
4. 1.2 Full Sentence 32
4.1.3 Diceware 32
4.1.4Coinware 33
4. 1 .5 Monolingual, Bilingual, and Multilingual Word Lists 33
4.1.6 Key Length Requirements of Coinware 34
4.2 Chinese-Character-Encoded Passphrase 36
4.2. 1 Environ Password 37
4.2.2 Unicode 37
4.2.3 Chinese Language Password (CLPW) 38
4.2.4 Key Length Requirements for Coinware in Chinese Language 41
4.2.5 Self-Created Signature-like Han Character 41
4.2.6 Self-Created Chinese Language Passphrase (CLPP) 42
4.2.7 Cantonese Language Password Using Jyutping 43
4.2.8 Japanese Language Password Using Romaji 45
4.2.9 Key Length Requirements for Various Chinese Key Spaces 46
4.2.10 Example to Create CLPW and CLPP ^ 47
4.3 Two-Dimensional (2D) Key 50
4.3.1 Related Work: Single-Line Key/Password Field 53
4.3.2 Related Work: Key Strengthening 53
4.3.3 2D Key Input Method ᄂ ᄂ 54
4.3.4 Styles of 2D Key: Multiline Passphrase 57
4.3.5 Styles of 2D Key: Crossword 57
4.3.6 Styles of 2D Key: ASCII Art I Unicode Art 58
4.3.7 Styles of 2D Key: Colourful Text 59
4.3.8 Styles of 2D Key: Sensitive Input Sequence 59
4.3.9 Applications for Symmetric and Asymmetric Key Crypto systems 60
4.3.10 Conclusion 61
CHAPTER 5: CREATING BIG MEMORIZABLE SECRET (PART 3) 62
5.1 Multilingual Key 62
5.1.1 Related Works 62
5.1.2 Black-and-White Multilingual Key 62
5.1.3 Grid Partitioning for Higher Entropy and Randomness 64
5.1.4 Colourful Multilingual Key " 67
5.1.5 Font Technologies to Solve Data Size Problem 67
Xll
5.1.6 Resistance Techniques to Shoulder-Surfing Attack 69
5.1.7 Fast Search for a Unicode Graphic Symbol 69
5.1.8 Applications for Symmetric and Asymmetric Key Crypto systems 71
5.2 Multi-Tier Geo-Image Key 72
5.3 Multi-Factor Multimedia Key Using Software Token 74
5.3.1 Related Work ' ᄂ 77
5.3.2 Using Key the Secret and USB Flash Drive 77
5.3.3 MePKC Application with Optional Split Key Method 77
5.3.4 Software Prototype 78
5.4 Hybrid Combinations 78
CHAPTER 6: MULTIMEDIA NOISES FOR MORE RANDOM SECRET 79
6.1 Introduction 79
6.2 Semantic Error Occurrences in the Multimedia Communications 79
6.2.1 Introduction 80
6.2.2 Multimedia Type of Bit Stream 81
6.2.3 Multimedia Type of Text 81
6.2.4 Multimedia Type of Image 85
6.2.5 Multimedia Type of Audio 86
6.2.6 Multimedia Type of Video 88
6.2.7 Duplication of Multimedia Data 89
6.2.8 Conclusion 89
6.3 Decrypting English Text Using Enhanced Frequency Analysis 90
6.3.1 Introduction 91
6.3.2 Justification on Frequency Analysis 91
6.3.3 Drawbacks or Conventional Frequency Analysis 94
6.3.4 Combined Methods of Frequency Analysis 95
6.3.5 Proposed Method: Enhanced Frequency Analysis 96
6.3.6 Conclusion 98
6.4 Passphrase with Semantic Noises and a Proof on Its Higher Information
Rate ᄂ 99
6.4.1 Introduction 100
6.4.2 Key Sizes and Passphrases 101
6.4.3 Unicity Distance and Passphrases with Semantic Noises 102
6.4.4 Proof of Higher Information Rate 106
6.4.5 Conclusion 107
6.5 Information Rates and Unicity Distances 108
CHAPTER 7: MULTIHASH KEY 112
7. 1 Introduction 112
7.2 Multiple hashes of single key with passcode for multiple accounts 1 12
7.2.1 Introduction 113
7.2.2 Related Works 116
7.2.3 Basic Model ofMultihash Key 118
Xlll
7.2.4 Discussions 124
7.2.5 Limitations 126
7.2.6 Conclusion 128
7.3 More Slave Keys for Offline Accounts per Master Key of Multihash Key 128
7.3.1 Related Works 131
7.3.2 First Method: Using Filename 132
7.3.3 Second Method: Using a Random Number 133
7.3.4 Third Method: Using a Two-Tier Structure 135
7.3.5 Conclusion 136
7.4 First Variant of Multihash Key Using Automatically Selected Tiers and
Security Levels 136
7.5 Second Variant of Multihash Key Using Automatically Selected
Permutation Sequence of Security Levels 138
7.6 Third Variant of Multihash Key Using Hybrid Combination 141
7.7 Fourth Variant of Multihash Key as a Further Authentication Factor 143
7.8 Fifth Variant of Multihash Key as a Simple Key Escrow Method and
System 145
7.9 Discussions on Variants of Multihash Key 146
CHAPTER 8: MULTIHASH SIGNATURE 147
8.1 Introduction 147
8.2 Classical Digital Signature Scheme 149
8.3 Applications of Hashing 149
8.4 Proposed Method: Single Message with Multiple Digital Signatures from
Single Asymmetric Key Pair 150
8.5 Comparisons for Advantages 152
8.6 Conclusion 156
CHAPTER 9: APPLICATIONS OF BIG SECRET & MePKC (PART 1) 157
9. 1 Applications of Created Big Memorizable Secret(s) 157
9.2 Memorizable Symmetric Key to Resist Quantum Computer Attack 158
9.3 Memorizable Public-Key Cryptography (MePKC) 159
9.3.1 Related Works: Storages of Private Key 159
9.3.2 The Proposed MePKC Appliacation 9.1(ii) 160
9.4 Other Cryptograpnic, Information-Hiding, and Non-Cryptograpnic
Applications of Secret beyond 128 bits 163
CHAPTER 10: APPLICATIONS OF BIG SECRET & MePKC (PART 2) 165
10.1 Identification Hardening of Embedded Data in Steganography 165
10.1.1 Related Works 165
10.1.2 The Proposed MePKC Appliacation 9.1(iv) 165
10.2 Electronic Fund Transfer Using MePKC 168
xiv
10.2.1 Related Works 168
10.2.2 The Proposed MePKC Appliacation 9.1(v) 172
10.3 Electronic Software Licensing Using MePKC 172
10.3.1 Related Works ᄂ ᄂ 172
10.3.2 The Proposed MePKC Appliacation 9.1(vi) 173
CHAPTER 11: APPLICATIONS OF BIG SECRET & MePKC (PART 3) 177
11.1 MePKC Human-Computer and Human-Human Authentication Schemes 177
11.1.1 Related Works: Computer Password Authentication Protocol 1 77
11.1.2 First Model without Perfect Forward Secrecy 179
11.1.3 Second Model with Perfect Forward Secrecy 1 80
11.1.4 Re-Authentication Rules 185
11.2 MePKC Digital Certificate Having More Than One Asymmetric Key Pair
for Different Protection Periods and Password Throttling 1 86
11.2.1 Related Works: Digital Certificate and Password Throttling 1 86
1 1 .2.2 MePKC Digital Certificate with Many Asymmetric Key Pairs 1 87
11.3 Three-Tier MePKC Digital Certificates for Ladder Authentication 1 89
11.3.1 Related Works: Digital Certificate and Ladder Authentication 1 89
11.3.2 Three-Tier MePKC Digital Certificates for Various Applications 1 90
11.4 Anti-Phishing Using MePKC Authentication Schemes 193
CHAPTER 12: APPLICATIONS OF BIG SECRET & MePKC (PART 4) 194
12.1 Archiving the Voice/Video Calls of Wired/Wireless Phones 194
12.1.1 Related Works 194
12.1.2 The Proposed Model 195
12.2 Multipartite Electronic Commerce Transactions Using MePKC 197
12.2.1 Related Works ᄂ 197
12.2.2 Artificial Neural Network Based Byzantine Agreement Protocol
(ANN Based BAP) ᄂ 199
12.2.3 Entity Partitioning in the Electronic Commerce Transactions 200
12.2.4 Tripartite ANN Based BAP with Trusted Party 207
12.2.5 Tripartite ANN Based BAP without Trusted Party 207
12.3 Trust Boosting of MePKC Digital Certificate by Using More than One
Certification Authority and/or Introducer of Trust of Web 207
12.3. 1 Related Works: Risks of Public Key Infrastructure 207
12.3.2 Some Human Interaction Models 209
12.3.3 Model to Boost up the Trust of MePKC Digital Certificate 218
CHAPTER 13: MePKC TIMESTAMPING SCHEME FOR EVIDENCE
OF INTELLECTUAL PROPERTY (IP) ORIGINALITY 221
13.1 Proof of Copyright Ownership Using Digital Time stamp in Malaysia 221
13.1.1 Introduction 221
XV
13.1.2 Related Works: Copyright 223
13.1.3 Related Works: Methods of Proving Copyright Ownership 224
13.1.4 Digital Timestamping Scheme to Prove Copyright Ownership 227
13.1.5 Malaysia Digital Signature Act 1997 and Regulations 1998
(Act 562) 227
13.1.6 Malaysia Evidence Act 1950 (Act 56) 230
13.1.7 Security Analysis 231
13.1.8 Computation Load 232
13.1.9 Implementation Costs 232
13.1.10 Comparisons 234
13.1.11 Conclusion 235
13.2 IP Evidence Using Digital Timestamp 235
13.2.1 Introduction 235
13.2.2 Related Works: Patent Filing Systems 236
13.2.3 Related Works: Digital Timestamping Scheme 237
13.2.4 Proposing Limited First-to-invent Patent Filing System 237
CHAPTER 14: HACK-PROOF DATA STORAGE USING
INNOVATED DIP SWITCH 241
14.1 Abstract 241
14.2 Introduction 241
14.3 Related Prior Arts 242
14.4 Proposed Secure DIP Switch 243
14.5 Method and Device to Secure Hacking-Free Data Storage 245
14.6 Costs and Reliability 246
14.7 Other Forms of Innovation 248
14.8 Conclusion 249
CHAPTER 15: CONCLUSIONS 250
15.1 Concise Summary 250
15.2 Other Supporting Reading Materials in This Research Project 252
15.2.1 NIST Publication 252
15. 2. z Security and Privacy 253
15.2.3 Other Resources 253
15.3 Suggestions for Future Research 254
15.3.1 Fixed- Width Font Supporting All the Unicode Graphic Symbols 254
15.3.2 512-Bit Multihash Key Needs Hash Function beyond 1024 Bits 254
15.3.3 MePKC Extension to Other Non-Conventional Cryptographic
Schemes 255
15.3.4 Big Secret(s) for Information-Hiding and Non-Cryptographic
Applications 255
15.3.5 Safety Box Using Computerized Lock 256
15.3.6 Provable Security Studies 256
15.3.7 Statistical Surveys for Various Security Schemes 257
xvi
15.4 Conclusions 257
APPENDIX A: WRITING SYSTEMS OF THE WORLD 258
APPENDIX B : CHILD-MADE 2D KEYS 261
REFERENCES 262
ACRONYMS 334
xvii
LIST OF TABLES
Table 3.1 Minimum symmetric key sizes for different security levels of protection
18
Table 3.2 Minimum asymmetric key sizes in equivalent with the security levels of
symmetric key sizes 19
Table 3.3 Various key sizes corresponding to the numbers of ASCII characters,
Unicode (version 5.0) characters, and password units of various secret
creation methods, as well as the settings sufficiency of some key input
methods and systems 21
Table 4.1 Passphrase generation from acronym 31
Table 4.2 Minimum diceware words (7776 word list) for different security levels
33
Table 4.3 Conversions between binary and hexadecimal numeral systems 33
Table 4.4 Key size equivalence for symmetric and asymmetric crypto systems (bit)
35
Table 4.5 Minimum coinware words for various word list sizes (WLS) 35
Table 4.6 Environ password 37
Table 4.7 Phonetic encoding of Hanyu Pinyin (Mandarin-based) 39
Table 4.8 Character structure encoding of Sijiao Haoma 40
Table 4.9 Forms of Romanized Chinese-character-encoded words 40
Table 4.10 Minimum coinware words for Han character combined list (70229
words) 41
Table 4.11 Forms of self-created Chinese language passphrase for ( 汉 ) 43
Table 4.12 Phonetic encoding of jyutping in Cantonese language 44
Table 4.13 Forms of self-created Cantonese language passphrase for (汉) 45
Table 4.14 Forms of Japanese language password for (大) , (漢) , and (山)
46
Table 4.15 Minimum key lengths for various Chinese key spaces (in Han character)
46.
Table 4.16 Dimensions or 2D key for various symmetric key sizes 60
Table 6.1 Frequency analyses of various sources [ascribe to Bauer (2002)] 94
xvm
Table 6.2 Sequence of keyword rules for modified frequency analysis 97
Table 6.3 ASCII mutual substitution table 105
Table 6.4 Determination of the critical points of function j2 107
Table 7. 1 Binary-to-text encoding Bin2Txt(H) of multihash key 122
Table 7.2 Comparisons of key management tools 124
Table 8.1 Comparisons of classical and multihash-based digital signature schemes
154
Table 13.1 Comparisons of our scheme with linking and tree timestamping schemes
232
Table 13.2 Cost estimation table of a digital timestamping scheme in Malaysia on 8
June 07 233
Table 13.3 Comparisons of methods to prove copyright authorship/ownership 234
Table 13.4 Advantages and disadvantages of first-to-file patent filing system 239
Table 13.5 Advantages and disadvantages of first-to-invent patent filing system 239
Table 13.6 Advantages & disadvantages of limited first-to-invent patent filing
system 240
Table 14.1 Operating modes of method and device to secure hack-proof data storage
246
Table A. 1 Functional classification of writing systems 259
Table A.2 List or languages by number of native speakers 260
xix
LIST OF FIGURES
Figure 0.1 Two-dimensional (2D) key x
Figure 3.1 Generations and applications of one/more big memorizable secrets 28
Figure 4.1 Chinese poem for easy memorization of Sijiao Haoma 40
Figure 4.2 Example of self-created signature-like Han character by modifying the
Han character of (汉) from [Hanyu Pinyin = han4] and [Sijiao Haoma
= 37140] to [Hanyu Pinyin = han4] and [Sijiao Haoma = 37141] 42
Figure 4.3 Example of self-created signature-like Han character from {han} ( 、汉 )
48
Figure 4.4 Operation of 2D key input method and system 52
Figure 4.5 Pseudocode of 2D key input method and system 55
Figure 4.6 Styles of 2D key: Multiline passphrase 57
Figure 4.7 Styles of 2D key: Crossword 57
Figure 4.8 Styles of 2D key: ASCII art 58
Figure 4.9 Styles of 2D key: Unicode art 59
Figure 5.1 One of the exemplary tabular pages of multilingual key consisting of the
first 2^o Han characters in the Unicode and starting from Unicode value
{4E00} 63
Figure 5.2 A Han character from Unicode before and after the grid partitioning for
various settings 64
Figure 5.3 Grid partitioning encoding of a graphic symbol 65
Figure 5.4 (16+l)-colour scheme for colourful multilingual key 68
Figure 5.D Operation of multilingual key input method and system 70
Figure 5.6 Operation of multi-tier geo-image key input method and system 73
Figure 5.7 Software token generation of multi-factor multimedia key input method
and system 75
Figure 5.8 Software token acquisition and application of multi-factor multimedia
key input method and system 76
Figure 6.1 Al-KindT's explanation on the revolutionary system of cryptanalytic
technique 92
Figure 6.2 Implementation of enhanced frequency analysis 98
XX
Figure 7.1 Pseudo-code to determine the numbers of hash iteration for multiple
security levels of multihash key methods and systems 119
Figure 7.2 Operation of the basic model of multihash key method and system 120
Figure 7.3 Proposed usages of 20 security levels 123
Figure 7.4 Methods and systems to support more offline accounts for multihash
130
Figure 7.5 First variant of multihash key method and system to support more offline
accounts using automatically selected tiers and security levels 137
Figure 7.6 Second variant of multihash key method and system to support more
offline accounts using automatically selected permutation sequence of
security levels 139
Figure 7.7 Third variant of multihash key method and system to support more
offline accounts using a hybrid combination of automatically selected
tiers and security levels, and automatically selected permutation sequence
of security levels 142
Figure 7.8 Fourth variant of multihash key method and system for the specific
application to act as a further authentication factor in the Internet banking
or other situations 144
Figure 7.9 Fifth variant of multihash key method and system for the specific
application to act as a simple key escrow method and system for
supervisor-wise non-critical secrets 145
Figure 8.1 Pseudocode of the classical digital signature scheme 149
Figure 8.2 Pseudocode of the proposed multihash signature scheme 151
Figure 8.3 Multihash signature method and system to provide object-designated
signature message 153
Figure 9. 1 Operation of MePKC method and system 161
Figure 10.1 Data embedding process into a cover data for method and system to
harden the identification of an embedded data in steganography although
stego-data has been detected 166
Figure 10.2Data extracting process of embedded data from a stego-data for method
and system to harden the identification of an embedded data in
steganography although stego-data has been detected 167
xxi
Figure 10.3 Samples of digital cheque in triple-watermark digital cheque scheme 169
Figure 10.4 Creation of blank cheque by a bank and written cheque by a payer in the
triple-watermark digital cheque method and system 170
Figure 10.5 Cheque crediting process by a payee in the triple-watermark digital
cheque method and system 171
Figure 10.6 Samples of digital software license in triple-watermark digital software
license scheme 174
Figure 10.7 Creation of blank software license by a vendor and written software
license by a reseller in the triple-watermark digital software license
method and system 175
Figure 10.8 Endorsement process of a software license by a licensee in the triple-
watermark digital software license method and system 176
Figure 11.1 Various not- so-frequent operations of the basic model of MePKC
authentication schemes with feature of non-plaintext equivalence 181
Figure 11. 2 First basic model of MePKC authentication scheme between a human
user and a computer with features of non-plaintext equivalence and
optional mutual authentication 1 82
Figure 11. 3 Various not- so-frequent operations of the second model of MePKC
authentication schemes with features of non-plaintext equivalence and
perfect forward secrecy 183
Figure 11. 4 Second model of MePKC authentication scheme between a human user
and a computer with features of non-plaintext equivalence, perfect
forward secrecy, and optional key exchange scheme (Part 1) 184
Figure 11.5 Second model of MePKC authentication scheme between a human user
and a computer with features of non-plaintext equivalence, perfect
forward secrecy, and optional key exchange scheme (Part 2) 185
Figure 11. 6 MePKC digital certificate with four public keys for various applications,
such as password throttling 188
Figure 11. 7 Three-tier MePKC digital certificates for various applications, such as
persistent private key, rolling private key, and ladder authentication 191
Figure 12.1 Operations to record, store, access, manage, and download the voice
mail, voice call, and video call in the distributed servers at the CO of
PSTN of wireline phone and/or CM of MTSO of wireless phone 196
Figure 12.2 ANN based BAP and its smallest model of 4-node distributed network
201
Figure 12. 3 Total number of exchanged messages for different types of BAP 202
Figure 12.4Partitioning of a distributed network and its optimal partitioning selection
203
Figure 12.5 Partitioning of the entities involved in the electronic commerce
transactions into three groups: Essential group, government group, and
non-essential group 204
Figure 12.6Tripartite ANN based BAP with trusted party and faulty node detection
for multipartite electronic commerce transaction using MePKC
cryptographic schemes for communications 205
Figure 12.7 Tripartite ANN based BAP without trusted party but still with faulty
node detection for multipartite electronic commerce transaction using
MePKC cryptographic schemes for communications 206
Figure 12. 8 Group efficiency of a committee meeting according to the Kurokawa's
human interaction model 211
Figure 12.9 Group efficiency of an exploratory group according to the Kurokawa's
human interaction model 212
Fig. 12.10 Success probability of technology transfer according to the Kurokawa's
human interaction model 213
Fig. 12.11 Group efficiency of an exploratory group formed from leaders of some
committee meetings (without condition for common consensus) as
modified and enhanced from the Kurokawa's human interaction models
214
Fig. 12.12 Group efficiency of an exploratory group formed from leaders of some
committee meetings (with condition for common consensus) as modified
and enhanced from the Kurokawa's human interaction models 215
xxiii
Fig. 12.13 Success probability of an exploratory group formed from leaders of some
committee meetings (with condition for common consensus) ) as
modified and enhanced from the Kurokawa's human interaction models
216
Fig. 12. 14 Method and system to boost up the trust level of MePKC digital
certificate by using more than one certification authority (CA) and/or
introducer of trust of web 219
Figure 13.1 Generation of timestamp and superhash 228
Figure 13.2 Verification of a signed timestamp 229
Figure 13.3 Verification of daily superhash to limit TSA power 229
Figure 14.1 Structural diagram of conventional 10-way DIP switch 244
Figure 14.2 Structural diagram of proposed 10/ 12- way secure DIP switch 244
Figure 14. 3 Innovated 10-way 8PST+2PST DIL switch activated in opposite
direction 248
Figure A.l Writing systems of the world 258
Figure B.l 2D keys using ASCII art and Chinese characters meaning "twenty first
day" [二 ^ ^一 日] 261
Figure B.2 2D keys using ASCII art and Chinese characters meaning "cloudy sky
nurtures the woods" [云 天工 木] 261
xxiv
PREFACE
This book of research essay in the form of thesis towards a future possible
doctorate thesis is the author's works prepared outside the working time of
undergraduate teaching. It is published online here mainly for advertisement
purposes to save development costs, public peer reviews due to the lacking of
evaluation experts in the author's social networks, and to speed up the research
process of human civilization for the betterment of multicultural societies.
In addition, in parallel with the purpose to gain public peer review, this book
will be an output documentation of a research project registered on 27 May 2004 to
achieve three aims at one stroke. These three aims are to solve an imperative research
problem, to develop intellectual properties (IPs) to support an entrepreneurship, and
to qualify a person for a doctoral degree. The proposal defence seminar, first work
completion seminar, second work completion seminar, notice of thesis submission
request, and MMU (Multimedia University) approval of this thesis title to enable its
experts' evaluation are on 14 March 2005, 18 February 2008, 2 July 2008, 23 July
2008, and 1 December 2008, respectively. Nevertheless, this thesis-like book is
mainly prepared in October 2008.
Before reading further the contents of this book (aka thesis), please be
reminded that the process to produce the research results of this thesis is full of
human-made obstacles like graft, office politics, supervisor appointment, placement
of doctoral candidature under closer monitoring on the brink of termination, oral
requests to give up the teaching assistantship in the form of sound snatching to stop
the doctoral candidature, listings of authorship and inventorship, procrastination of
work completion seminar, extraordinary request of another work completion seminar
even though sufficient novel research results have been presented, etc.
Hence, to those whom have significantly and purposefully caused the
damages and delays in the production of any author's research outputs, like a cash
value of MYR$200-00 and procrastination of 1 hour, please confess to the God(s)
and surrender yourself to the judge(s) for deserved punishment before proceeding
with the thesis contents and any applications for any purposes. Otherwise, for the
breach, please damn yourself as well by God(s) for the deserved punishment together
XXV
with your offspring supporting your deeds. And yet for those who are helpful for
their kind-hearted deeds towards the success of this thesis book, may the God(s)
blesses them and their offspring supporting their deeds.
Due to the relatively high research costs invested by the author, for refund, as
well as for building up a fund for further maintenance, research and development,
any original and novel idea conceptions from the author in this book is only free of
usage for public interests, press report, private study, research, and teaching
throughout the World, with the condition that proper originality citation for source
references has been clearly shown. Yet for any commercial usage, prior consent has
to be obtained from the author or his successor(s).
After the author's decision for not furthering his doctoral research studies
under the Lee Foundation Scholarship as communicated by Professor Michael T.-C.
Fang, this research project began with its idea conception in the end of 2003 by
having the official PhD project application date on 12 November 2003. It began with
the studies of multimedia communications security in general and autosophy
communications in particular. Then, in October 2005, some novel ideas were
conceptualized on how to protect the data crystal of autosophy communications in
particular, which is then generalized for any common computer data protection, to
networked information security, and any applications of big secret beyond 128 bits in
information engineering.
Let's create and maintain a networked info-computer age for a more
paperless, petroleum-less, and environment-friendly human society by having safer
multipartite electronic computer communications as from the original and novel
knowledge contribution of this research project.
xxvi
CHAPTER 1 OVERVIEW
1.1 Introduction
The world human population in year 2008 has achieved beyond 6.7 billion.
At the same time, the world climate, resources, and environment are having red
alarms on. Information communications technologies (ICT), especially the electronic
communications of Internet, are believed to be tools to reduce the paper usages and
transportation demands, as well as to cultivate a global economy with smoother
demands and supplies. Security, health, food and beverages, accommodation, family,
career, education, finance, sex, entertainment, sport, etc. are human major concerned
topics. Their importance is in descending order for a majority of people.
Here, when ICT is applied to preserve more Earth resources and to conserve
friendly environment, information security is always a major people concern for
important computer communications. As for the Internet, identity theft is a serious
crime in the electronic commerce and electronic government. Yet another serious
offence is copyright piracy of literary works, software, music, image, and video. Due
to the hacked computer databases of human records, the rights of privacy and
publicity are also hard to be controlled and guarded.
1.2 Motivation
In term of information security, it mainly consists of cryptology, information
hiding, and random number generator (RNG). Cryptology further consists of
cryptography and cryptanalysis. Information hiding further consists of steganography
and digital watermarking. RNG further consists of hardware RNG and software
pseudo-random number generator (PRNG).
To access and control a user identity of an information security system, there
are four types of authentication factors: What you know like secret, what you have
like token, what you are like biometrics (Menezes, Oorschot, & Vanstone, 1996;
Boatwright & Luo, 2007), and whom you know like introducer (Brainard, Juels,
Rivest, Szydlo, & Yung, 2006), in the ascending order of implementation costs.
1
These factors can be used individually or mixed. Among them, password the
secret is the most prevailing one for applying the symmetric key cryptography in the
Internet due to the low implementation costs, as well as good hardware and software
compatibilities. However, a secret, especially a long one, is subject to the
forgetfulness or the exposure of a secret written down. The situation becomes worse
when there are lots of accounts to be handled. If a secret is used for multiple accounts,
there exists domino effect of password reuse problem (Ives, Walsh, & Schneider,
2004) . Moreover, the memorizability size of a secret using the current prior art is
limited to 128 bits for a protection period of 30 years. To solve these problems, token
or biometrics with optionally bi-factor using a secret is used.
Nevertheless, token has the weaknesses of poor hardware and software
compatibilities, low portability when number of tokens per user is many, high
implementation costs (installation and maintenance), easy loss, possible dropping
damages, and token cracking (de Koning Gans, Hoepman & Garcia 2008; de Winter,
2008; Garcia, de Koning Gans, Muijrers, van Rossum, Verdult, Schreur & Jacobs,
2008; Wikipedia Contributors, 2008az).
Meanwhile biometrics has the disadvantages of poor hardware and software
compatibilities, domino effect due to limited biometrics to support multiple accounts,
no perfect accurate system due to FAR (False Acceptance Rate) and FRR (False
Rejection Rate), low usability and efficiency due to no universal accessibility and no
permanent availability from physiological and medical factors (Maghiros, Punie,
Delaitre, Lignos, Rodriguez, Ulbrich, Cabrera, Clements, Beslay, & van Bavel,
2005) , high implementation costs (installation and maintenance), as well as
irreplaceability and irreusability problems of biometrics upon hacking and stealth.
For examples of no universal accessibility of biometrics authentication
systems, there is no support for homozygotic twins, 5% of human are not fingerprint
recognition (Haylock, No date; Maltoni, Maio, Jain & Prabhakar, 2003; Vacca, 2007,
p. 280) supported due to diseases like eczema ("Singaporean Female," 2008) and
arthritis, human undergone surgery changing the facial structure needs re-enrolment
for face recognition, 1.8 aniridia patients out of 100,000 births and patients after laser
indotomy to correct angle-closure caused by glaucoma have no iris and are not iris
2
recognition supported, eyes alignment problem with camera of blind people and
patients of pronounced nystagmus (tremor of the eyes) are poorly iris recognition
supported, wheelchair users have usability problems of camera location and
insufficient height variation, cataract patients after operation may need re-enrolment,
and today DNA methods fail to differentiate monozygotic twins. For example of no
permanent availability, the high biometrics deformation rates of very young and very
old require frequent re-enrolment.
For the fourth authentication factor of "whom you know" like introducer and
referee, even though the authentication burden of the introducee can be relieved, the
burden has in fact been transferred to the introducer and it is up to the introducer to
use the authentication factor of what you know, what you have, and/or what you are.
Furthermore, there exist trust, responsibility, and obligation problems between the
introducer and introducee. The human interaction models (Kurokawa, 1988, 1990,
1991, 1997) are then required to analyze the security probability of this factor.
In view of the limitations of token and biometrics, how good if the
weaknesses of secret like memorizability and entropy size can be improved until the
token and biometrics are not needed for majority applications.
1.3 Research Aims
Here, the first main focus of this research project is for this direction:
Methods and systems to create big and yet memorizable secret(s). From a sufficiently
large and yet memorizable master key, it shall be possible to derive multiple unique
slave keys for multiple offline and online accounts. These slave keys shall be
impossible to be used to derive other slave keys.
For public-key cryptography (PKC), the smallest practically secure private
key size is 160 bits by using the FFC (Finite Field Cryptography) or ECC (Elliptic
Curve Cryptography) (Gehrmann & Naslund, 2005, 2006, 2007; E. Barker, W.
Barker, Burr, Polk, & Smid, 2007a, 2007b). Using the current prior arts like
encrypted private key, split private key (Ganesan, 1996b), and roaming private key
(Baltzley, 2000), there has been no fully memorizable private key yet. Here, the
second main focus of this research project is to develop fully memorizable private
3
key towards MePKC (Memorizable Public-Key Cryptography), aka MoPKC (Mobile
Public-Key Cryptography). The third research focus is to apply the outputs from the
first and second foci of this research project for various applications in the field of
information engineering.
1.4 Research Methodology
This research project originally contributes novel methods and systems to
create big and yet memorizable secret(s) and then MePKC for various applications in
information engineering. As from Spafford ( 1 993), there are three types of
techniques to prove a model in a computing dissertation: Analytic method using
formal manipulations, stochastic method using statistical measurements, and building
a prototype for experimental testing.
For the research methodology of this research project, the third method of
building a prototype is used to show that it is possible to create big and yet
memorizable secret by using 2-dimensional (2D) key (Lee, 2006b, 2008i), and
further for the practical realization of MePKC (Lee & Tan, 2006b; Lee, 2008j). Some
prototypes of the other big secret creation methods have also been built (Lee & Tan
2006a; Lee, 2008k).
To show the security strength and protection period of various security
schemes in this research project, the first method of analytically formal
manipulations has been used. Since the author cum researcher is an electrical
engineer and not educated as a mathematician, the reduction-based security (aka
provable security) approach is only tried on his best effort as time allows. Hence,
those cryptographers from the mathematics field are expected to carry out some
provable security studies on the security schemes proposed here whenever the big
secret creation method(s) is applied, especially for the MePKC and its applications.
1.5 Organisation of the Thesis
Generally, the present invention of this thesis generally relates to computer
communications security. More particularly, the present invention relates to key
4
management of cryptography and information security. Most particularly, the present
invention relates to methods and systems to create big and yet memorizable secrets
that are large enough for the higher levels of security strength of security systems
like AES-256, 256-bit ECC, 256-bit PRNG, and so on, (where AES stands for
Advanced Encryption Standard; ECC stands for Elliptic Curve Cryptography; and
PRNG stands for Pseudo-Random Number Generator), together with their derived
applications in the general field of information engineering and specific field of
information security like memorizable public-key cryptography (MePKC).
Particularly, the present invention broadly provides novel generation methods
and systems of big memorizable secrets to practically realize stronger security levels
of cryptographic, information-hiding, and non-cryptographic applications in the
information engineering, especially MePKC (Memorizable Public-Key
Cryptography). The first independent embodiment of the present invention is the
methods and systems to create big and yet memorizable secrets. The second
independent invention embodiment is mutlihash key using hash iteration and hash
truncation to create multiple slave keys from a single master key. And yet the third
independent embodiment of the invention is multihash signature that allows object-
designated message with specific meaning, function, or recipient. From these three
independent inventions, there are then various types of dependent inventions for
various practical applications mainly due to the existence of big memorizable secrets.
The organisation of this thesis has three components: Preliminary section,
chapter section, and postscript section. The preliminary section consists of front page,
copyright page, declaration, acknowledgements, dedication, abstract, table of
contents, list of tables, list of figures, and prefaces. For the postscript section, it has
an appendix to show the writing systems of the world, references, and acronyms.
There are 15 chapters in the chapter section. Chapter 1 is an overview of this
research project. Chapter 2 discusses the life of research postgraduate students in
brief, general conditions to get a doctoral degree, and the practical evaluation on
knowledge contribution to qualify a person as a quality researcher.
Chapters 3, 4, and 5 form closely related contexts to explain methods and
systems to create big and yet memorizable secret. These methods include Chinese
5
language passphrase (CLPP), 2-dimensional (2D) key, multilingual key, multi-tier
geo-image key, multi-factor multimedia key using software token, and their hybrid
combinations. Chapter 6 enhances the secret randomness by using multimedia noises.
Chapter 7 presents a method and system called multihash key to generate
multiple unique slave keys (aka site keys) from a master key for both offline and
online accounts. This multihash key uses hash iteration and hash truncation. Every
slave key is computationally infeasible to be used to derive another slave key.
Chapter 8 on multihash signature uses the concept of hash iteration again to generate
multiple unique signature of a message file from only a single pair of asymmetric
key. Both multihash key and multihash signature are integrated into various MePKC
applications as explained in the latter chapters.
Chapters 9 to 13 are all on the applications of big secret and MePKC. Chapter
9 includes the applications for symmetric key cryptography, MePKC, as well as
other cryptographic, information-hiding, and non-cryptographic applications.
Chapter 10 includes the identification hardening of embedded data in steganography,
electronic fund transfer, and electronic software licensing. Chapter 11 includes the
local/remote human-computer and human- human authentication without shared
secret, MePKC digital certificate having more than one asymmetric key pair for
different protection periods and password throttling, as well as three-tier MePKC
digital certificate for ladder authentication. Chapter 12 includes archiving the
voice/ video calls of wired/wireless phones, multipartite electronic commerce
transactions, as well as trust boosting of MePKC digital certificate by using more
than one certification authority and/or introducer of trust of web. Chapter 13 talks on
MePKC timestamping scheme for evidence of intellectual property (IP) originality.
Chapter 14 is a hardware contribution to further secure the computer
communications of MePKC from virtual hacking over a connected computer
communications network like Internet. It is about a hack-proof data storage using
innovated DIP (Dual In-Line Package, aka DIL) switch. Chapter 15 concludes this
thesis by giving a concise summary on the originally contributed novel knowledge
and some suggestions for future research.
6
CHAPTER 2 EVALUATION ON KNOWLEDGE
CONTRIBUTION
2.1 Life of Research Postgraduate Students
Due to the abundance of knowledge to be explored since the availability of
computer assistance for the limits outside of the human capabilities, the research
postgraduate students at the universities studying for master's and doctoral degrees
blossom not only in the developed countries but the developing countries like
Malaysia as well. However, many postgraduate students in the developing countries
encounter the suitability problems of closely related research supervision and fresh
supervisors who are lacking of the supervision experience. Hence, it is good for a
postgraduate student to browse some informative materials discussing about the life
of research postgraduate students to smoothen the postgraduate studies.
Callahan (2001) has a brief article telling the story of Ph.D. study in the USA.
Pratt (1997) has a graduate school survival guide for us. desJardins (1994, 1995)
published articles in ACM Crossroads on how to be a good graduate students. Lauer
(No date) talked on how to prepare a Ph.D. thesis proposal in computing science.
Some supervisors require postgraduate students to publish copyrighted
journals and conference proceedings papers as a prerequisite for thesis submission.
Hence, it is good to know how to prepare a first draft of paper (San Francisco Edit,
No date). Smith (1990) told the task of the referee who would review the manuscript.
An IEEE fellow, who is B. K. Bose (2006), disclosed the tips to publish a
transactions article. Spafford (1993) briefed on Ph.D. dissertation (Wikipedia
Contributors, 2008t). Comer (1993) edited an article on how to write a Ph.D.
dissertation.
2.2 General Conditions to Get a Doctoral Degree
For lengthy and more informative materials on the life of research
postgraduate students, there are some books on this topic (Noble, 1994; Elphinstone
& Schweitzer, 1998; Cryer, 2000; Rugg & Petre, 2004; Phillips & Pugh, 2005).
The first doctoral degree was conferred in Paris circa 1150 (Noble, 1994).
Since then, the most basic condition to get a doctoral degree is to have contributed
sufficiently original and novel knowledge to the society. For honorary doctorate, the
analogous condition is sufficiently significant contribution to the society.
In some universities, the thesis publication is an optional component. Yet in
some universities now, a postgraduate student has to follow some preliminary
courses like entrepreneurship and research methodology. Other possible conditions
are proposal defence of research proposal and seminar defence of thesis. Depending
on research supervisors and universities, publishing journals and conference
proceedings papers are optional conditions to qualify for thesis submission.
2.3 Prior Approaches of Research Evaluation
Just like the quality control and evaluation of products and services, there are
various approaches to evaluate the research output. For doctoral dissertation awards
and novel idea competitions of the universities and professional organizations like
ACM (Association for Computing Machinery), Google, and IEEE (Institute of
Electrical and Electronics Engineers, Inc.), good evaluation techniques of research
results and novel ideas are required to determine who the award winners shall be.
The evaluation of a researcher's contribution is traditionally majority-wise
based on the publication counting, credit of journals and proceedings, citation
counting, H- index (Hirsch, 2005; Batista, Campiteli & Kinouchi, 2006; Wikipedia
Contributors, 2008bg) qualified peer evaluator, and contribution impact. The last
element, which is contribution impact, is in fact the main key measure to evaluate the
contribution of a researcher to the welfare of human civilization. However, this
element is not easy to be carried out by the management without the advice of the
expert. Hence, in deciding the recruitment, promotion, compensation, funding
allocation, reviewer list, and consultancy partnership, the publication counting
method is always used due to its easiness.
Lately, Parnas (2007) published his view on the publication counting method
and called for the halt of number game. He referred a paper by Ren and Taylor
(2007), which calls for automatic and versatile publication ranking, and pointed out
8
the weaknesses of publication counting method. These weaknesses are encouraging
superficial research, overly large groups, repetition, small and insignificant studies,
as well as rewarding publication of half-baked ideas. Parnas also acknowledged that
publication counting method could corrupt the researchers because malicious
researchers would have the behaviour of publishing pacts, clique building, anything
goes, bespoke research, and minimum publishable increment (MPI). As a solution,
he called for an accurate researcher evaluation, where the researcher's papers were
studied by qualified peer evaluators. The factors of slower time and e valuators'
compensation are the disadvantages of this method.
2.4 Contribution Impact
Here, a refinement of researcher evaluation from the Parnas' proposal is
proposed. Heavier weight shall be given to the contribution impact, which is to be
studied by the qualified peer evaluators. The evaluation methods based on
publication counting, credit of journals and proceedings, and citation counting are
inaccurate. For example, the same research result can be published two times as both
the patent and journal (Rivest, Shamir & Adleman, 1978, 1983). A second case is
that a same idea is published three times as proceedings paper, patent and journal
(MacKenzie & Reiter, 2001c, 2002, 2004). The example of the second case has
another closely related conference proceedings paper (MacKenzie, Oprea & Reiter,
2003). The third case is that an idea is published four times as technical report,
proceedings paper, patent, and journal (MacKenzie & Reiter, 2001a, 2001b, 2003,
2006). One more possible case is that an idea may be published as many as eight
times in the forms of technical report, conference proceedings paper, patent, journal,
thesis, book chapter, and book.
The proposal here is mainly aimed at evaluating the research results of the
scientists and engineers. The research types are fundamental, applied, and design-end
engineering. Meanwhile, the research results can be discovery, innovation or
invention documented as one or more types of IPs (Intellectual Properties). It can be
copyright like technical report, proceedings paper, magazine, letter, journal, book,
thesis, computer program, architectural plan, etc. Conference proceedings papers
9
include articles in the conference, symposium, workshop, and colloquium. Other
forms of IP are patent, utility model, industrial design (aka design patent), layout-
design of integrated circuit, trade mark, and confidential information. Two more
intangible assets are publicity right and privacy right.
Proceedings paper, magazine, letter, journal, and thesis are normally
reviewed lightly within a short time by one to three peer evaluators. On the other
hand, patent, utility model, and industrial design are evaluated intensively by patent
examiner within a long period of time ranging from 1 to 6 years or more. To fulfil
the patentability, there are four conditions: Novelty, utility (aka industrial
applicability), non-obviousness, and specification (i.e. within the patent classification
of a country). Some research results like evaluation, survey, analysis, case study, and
commentaries are not patentable. Commentaries include on-site experience,
viewpoint, technical opinion, and forum.
Besides, the guidelines for inventorship and authorship (Devenport, 2005;
Albert Einstein College of Medicine of Yeshiva University, 2008; Wikipedia
Contributors, 2008ao) shall be enforced strictly. The inventorship is enacted where
only people with idea conception can be listed and not the people with reduction to
practice, which when listed can acquit the accused infringers from infringement
charges (Setty & Gentry, 2002). For authorship, the law is not yet enacted and there
exist only ethical rules. Hence, there are authors due to idea conception, analytic
evaluation, reduction to practice, novel supervisory advice, nominal supervision,
fund raising, etc., where some of them are honorary authorship not accepted by some
editorial offices (IEEE Publications, 2002).
For contribution impact, the successful implementation and realization of a
research result for public usage and application are very important. Many research
results are only documented without a further development. This is in fact no
positive impact at all but negative impact due to a waste of resources.
Hence, besides Parnas' proposal to request a few peer reviewers to evaluate a
researcher's selected papers, the evaluated researcher has to list out the current
impact of one's research results. For paper with multiple authors or inventors, the
specific researcher has to point out one's contribution in the listed paper for impact
10
evaluation. For example, article like this (Re, Borean, Bozzi, et al., 2002) requires
detailed elaboration on the particular contribution of every single listed inventor or
author. This is important to avoid the pseudo-amplification phenomenon where a co-
written article is considered as whole unit in the invention counting of an inventor or
publication counting of an author.
The contribution impact can be a core, supporting element, and influence to a
past, present, and future product and/or service useful to the human society. The
obsolete technology, replacing technology, and alternative competing technology
have also to be accompanied with the researcher's selected papers.
Modern society has evolved from agricultural and industrial economy into
knowledge economy. In 2004, Taplin (2004) reported in a paper that IP assets
accounted for up to 70% and 40% of market values of all corporate assets in the USA
and Japan, respectively. Chandran (2007) stated that for any company, and especially
for pharmaceutical companies, IP is more valuable than any of its tangible physical
assets, where IP constituted more than 80% of the total revenues of any company
while tangible assets accounted for only 20%. Again, Ocean Tomo LLC (Ocean
Tomo, No date; Wikipedia Contributors, 2008d) figured out that the components of
S&P 500 market value in 2005 also had 79.7% to be intangible assets. Among the IP,
patent has the largest economic value.
From Abril and Plant (2007), only 5% of the US patents were licensed and
only 3% generated royalties. Research results with commercial values are normally
filed as patent today for refunding research costs, usage control, enabling mass
production, affordable cost and price control, reasonable income, technology control,
official government records, archival for future generations to further study, etc.
Under the new rules of USPTO (Dudas, 2007), a patent can only carry a
maximum of 5 independent claims and maximum 20 dependent claims in total. For
every independent claim, if fully developed, explained, and evaluated, it can amount
to a proceedings paper and/or journal. Furthermore, inventorship is stricter than
authorship, only the researcher with novel conception can be listed and not the
researcher carrying out the reduction to practice. Hence, the inventorship can better
determine the main original knowledge contributor.
11
Therefore, the Parnas' suggestion has to include the request for the evaluated
researcher to list out the impacts of one's research papers to the human civilization.
Listed impacts by the researcher can speed up the evaluation process. This additional
step can also encourage more research results to be fully developed for public usage,
instead of just discussing a war on some plain papers.
2.5 Research Quality
When the researcher has listed out the implemented products and services as
the impacts of one's research papers, the research quality of these outputs started as
an idea is then to be evaluated. The idea evaluation criteria based on Google Project
10 100 (2008) are reach, depth, attainability, efficiency, and longevity. These five
criteria correspond with five questions "How many people will this idea affect?",
"How deeply are people impacted? How urgent is the need?", "Can this idea be
implemented within a year or two?", "How simple and cost-effective is your idea?",
and "How long will the idea's impact last?", respectively.
Yet there are two persons telling how important a good idea is. Pierer studied
law and economics, and he is the president and CEO of Siemens AG. Oetinger
studied political science in Berlin and business administration at Stanford Graduate
School of Business, and he works for Boston Consulting Group, where he is a senior
vice president and director of The Strategy Institute. In their book entitled "A
Passion for Ideas: How Innovators Create the New and Shape Our World" (Pierer &
Oetinger, 2002), they wrote in the book cover that "The creation, implementation,
and sustainability of new ideas is the lifeblood ensuring the growth and viability of
any organization. Without continuing innovation, competitive advantage and global
market share are endangered. Once-thriving organizations can find themselves
unprepared for the future." This tells how important new ideas are to any
organization including company, university and government for their thriving
sustainability and continuous success. In a smaller scale, the successful completion
of a research degree like master's and doctoral degrees also depends on the sufficient
novel ideas contributed to the pool of human knowledge for further betterment of our
civilization.
12
In the more developed countries, a good idea resulted from the research is
normally filed for patent before any public disclosure or within one year from the
first date of the public disclosure. Good examples can be observed from the fields of
fibre optic communications (Hayes, 2001, pp. 1-12), laser (Taylor, 2002), and
cryptography (Rivest, Shamir & Adleman, 1983). For less developed countries, the
IPs like patent and copyright are not so strongly focused and emphasized as in more
developed countries. The reasons are explained by Scalise (1999) that less developed
countries respond to their comparative advantage in imitation by lowering IPR
protection to reduce the cost of imitation's inputs, and more developed countries
respond to their comparative advantage in innovation by raising IPR protection to
increase the value or innovation's output.
Hence, to catch up with the more developed countries, the less developed
countries have to culminate in their research to produce the most dominant form of
IP, i.e. patent. Turk (2005) expressed that the most important IP legal issues of the
twenty- first century is to standardize global IP rights to facilitate a better mass
production, lower operating costs, and smoother supply-demand chains.
The patent grant rate in the US is about 75% (Ebert, 2004, 2005, 2007). The
high patent grant rate does not mean there are lots of useful and yet competitive
inventions. In fact, Professor Adam Jaffe in his testimony before the Judiciary
Subcommittee on the Courts, the Internet, and Intellectual Property claimed that lots
of US patents were worthless and unimportant ("Prepared Testimony," 2007). This
fact is also true for copyrighted publications or journals and conference proceedings.
Then, this comes to the question where the great inventors have gone (Bessen,
2004). However, fame is just one of the main factors people filing patents. Another
more important factor is the economic values of a patent to perform like a property
(Meurer & Bessen, 2008). This has caused an abundance of patent applications in the
US and examination becomes a problem due to the lacking of patent examiners
("Prepared Testimony," 2007). The abuse of US patent system is called to a halt
(Lemley & Moore, 2004; Lemley & Sampat, 2007). To solve the examination
problem, Beth Noveck created a voluntary system called "Peer to Patent Project" for
community patent review to assist the USPTO patent examiners (Duane, 2008; Oram,
13
2008; "Peer to Patent," No date). Later, the JPO (Japan Patent Office) has also
launched its version of community patent review system called
Komyunitipatentorebyu [コ ミュ ニ ティ パ テン ト レビュー]. Lately, the US
Chamber of Commerce (USCOC) has recommended the Peer to Patent Project for
further implementation ("Recommendations for consideration," No date). In analogy,
the journals and conference proceedings also have a similar review system called
Computing Review under the ACM ("Computing Reviews," No date).
The inventions in this research project in the IP form are mainly software
patents or CIIs (Computer- Implemented Inventions). In the US, there has been a time
where people questioning on whether software patents shall exist (Samuelson, 1990).
Now, the question has changed to how to improve software patent quality (Thatcher
& Pingrv, 2007). Here, the inventions of this research project have been filed for
patents (Lee, 2008h) and now are pending for patent examinations. The
implementation for public usages has been partially done. However, the research
quality is yet to be investigated.
To evaluate the research quality, a currently common method is citation
counting. This is true for journals, conference proceedings as well as patents. There
are also citation analyses or journals, conference proceedings, and standards based on
the citing patents. Example is IEEE papers based on US patents (Thomas &
Breitzman, 2006a; Piatt, 2006a, 2006b; Breitzman, 2007, 2008) and EU patents
(Breitzman, 2006). From these IEEE papers, Canning (2006) suggested the libraries
to optimize the financial budgets for scholarly collections. IEEE also has occasional
published articles to analyze the US patents (Goldstein, 2006; Sweet, 2007).
Besides, there are some organizations specialized in the research evaluation
("1790 Analytics," No date; "Research Evaluation," No date). The 1790 Analytics
discovered that hot patents were normally linked with government-funded scientific
research (Thomas & Breitzman, 2006b). Hot patents are patents whose impact on
recent technology developments is particularly strong. These hot patents shall be
identified to know the most competing patents for commercial profits. The damage
award (Aharonian, No date) of a patent infringement has a record of USD$1.52
billion for Alcatel-Lucent v. Microsoft in the US (Wikipedia Contributors, 2008an).
14
Spours (2006) discussed on how to exploit patents for profit. Since the
academicians' research funding at the universities is normally financed by the
taxpayers' money, it shall not be wasted without any refund or profit. To encourage
the commercialization of university research, the US Bayh-Dole Act (Bayh, 2006)
was enacted in 1980 to allow the researchers and universities to be the IP assignees.
Bar ham and Foltz (No date) investigated the patent activities and commercialization
efforts of university life science researchers.
Bray and Lee (2000) analyzed the university revenues from technology
transfer and concluded that the average equity from a university spin-off company
was more than 10 times the average annual income from a traditional license.
Another available data of university licensing revenue is from School of Medicine,
Johns Hopkins University, Baltimore, Maryland, USA ("Licensing Revenue," No
date). From this encouraging university patent revenue, it also indirectly tells that the
research output is practical, useful, and cost-effective for the industries to apply.
Branstetter and Ogura (2005) had an article to show the example of knowledge
spillover from the bio-science academia to the industry.
For the specific patent quality, Malackowski and Barney (2008) had a general
discussion on this topic. On the other hand, Ocean Tomo (No, date; Wikipedia
Contributors, 2008d) has an Ocean Tomo 300 Patent Index to show that patent
quality can be measured.
There are also some patents on how to analyze and select good patents due to
their practical usability and competitiveness (Breitzman & Narin, 2001; J. A. Barney
& J. R. Barney, 2003; Williams, 2004). Patent exists on how to track and audit IP of
open source software (Donner, 1999, 2001; Bonnet, Baroniunas & Webbink, 2008).
There is another patent telling a method to obtain investment income based
on the capitalization of intellectual property (Elliott, 2007). Yet, there are patents on
how to license intellectual property assets (Shelton, 2007), how to do intangible
property transaction and leaseback business method (Walker, 2007), and protection
against the changes of intellectual property value (Risen & Covello, 2000).
All of these hint that optimum supply-demand chains or intangible assets are
forming gradually from problem, research, solution, investment, patenting,
15
capitalization, licensing, and commercialization to the customers. It also tells that the
method to evaluate and apply the novel idea, especially patent, is getting better in
terms of relevancy, accuracy, systematization, and valuation. The inventions in this
research project are expected to undergo these processes in the coming decades.
As of today, the best research evaluation experts are from 1790 Analytics
LLC (No date), USA, doing the patent analysis and intellectual property evaluation.
Its services are recruited by the IEEE, USA, which is the top organization in the field
of electrical and electronic engineering, as well as financial experts for equity
investment and other top ranking organizations.
Lastly, a reminder here is to note and emphasize that under the IP laws, only
those persons who have created sufficiently novel knowledge contribution are
qualified to be coined as the originating IP contributors like inventor, designer,
author, etc. This point is important to get rid of the malicious supervisors whom have
no significantly novel knowledge contribution but wanted to be listed as co-
contributors to seek for better career profile towards more bonus and salary
increment, faster and easier promotion, as well as higher social recognition for
awards and reputation.
16
CHAPTER 3 CREATING BIG MEMORIZABLE SECRET
(PART 1)
3.1 Required Protection Periods and Their Key Sizes
According to Kerckhoffs' law (Schneier, 1996), a crypto system shall depend
100% on the secrecy of password or key only. In the words of Shannon's maxim, it
means "enemy knows the system". This law makes the civilian crypto system to have
publicly known algorithm except the classified governmental and military
information. This is needed to gain the public confidence for general daily
applications from the fear of possible backdoor. There are various applications of
secret in information engineering. Here, the required protection periods and their key
sizes are briefly discussed to know how big a memorizable secret shall be.
If a cryptographic algorithm is securely tested, the required key length in
character (L c ) of a password will depend on the factors of number of characters (C),
key space (S), secure period (T), guesses per unit of time (G), and probability of
guessing (P) (US Department of Defense, 1985). The minimum key length has to be
able to resist the brute force attack. The relationships of L c , C, S, T, G and P are
given in Equations (3.1) and (3.2).
^=f ( 3 .i)
L「 >
log 2 C
(3.2)
Nowadays, character encoding of ASCII is the most popular computing code.
ASCII has some key sets of 26 lowercase characters, 26 uppercase characters, 10
digits, 62 alphanumeric characters, 33 non-alphanumeric characters, 95 printable
characters, etc. If a key only has symbols of digits, its specialized name is passcode.
If a key is long or consists of printable characters, it is named as passphrase.
There were once three Data Encryption Standard (DES) challenges as in year
1997, 1998, and 1999. Using the distributed network computing, maximum guesses
of 2.45xl0 9 keys per second was once recorded. For the latest guesses per computer
17
as at end of year 2005, it is about 1.5x10 keys per second. The increment rate
follows the Moore's Law (Wikipedia Contributors, 2008v) where computer
performance is doubled for every 18 months. This indicates that strong password has
to be longer as time passing by if there is no special key processing added.
Key length in bit (L) means that there are 2 n possible keys for n-bit key. By
year 2010, the required key is 80 bits for symmetric key algorithm as announced by
U.S. National Institute for Standards and Technology (NIST). Meanwhile,
asymmetric key algorithm, like RSA, needs 1024 bits to be equivalently strong with
80-bit symmetric key algorithm as claimed by RSA Security. The key space varies
and depends on the security requirements.
For the AES suggested by NIST to replace the DES, it has three types of
symmetric key sizes. These key sizes are 128, 192, and 256 bits. Therefore, we have
AES-128, AES-192, and AES-256 to fulfill the demands of security levels at 128,
192, and 256 bits (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b). For
other security levels at 80 and 112 bits, NIST suggested two -key Triple Data
Encryption Algorithm (2TDEA) and three-key Triple Data Encryption Algorithm
(3TDEA), respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b).
Table 3.1 Minimum symmetric key sizes for different security levels of protection
Key Size, bit
Protection
# 1
32
Individual attacks in "real-time". Only acceptable for authentication tag size.
#2
64
Very short term protection. Obsolete for confidentiality in new systems.
#3
72
Short to medium term of protection depending on organization size.
#4
80
Smallest general purpose level, < 5 years protection.
#5
112
Medium term protection. About 20 years.
#6
128
Long term protection. Good, generic application independent
recommendation, about 30 years.
#7
256
Foreseeable future. Good protection against quantum computers.
Password choice depends on the strength and memorizability. Strength
depends on key size in bit. Memorizability depends on number of memorized secrets
in a human brain. For minimum key sizes at different security levels, it is shown in
Table 3.1 (Gehrmann & Naslund, 2005, 2006, 2007).
18
For short term memory of English-based digit, Miller (1956) showed an
average of 7 items plus or minus 2 (7 ± 2) (Jones, 2002). The good option is longer
key size in bit and still memorizable. Some articles on memory can be referred
(Baddeley, Thomson & Buchanan, 1975; Ellis & Hennelly, 1980; Hoosain & Salili,
1988; Cowan, 2001; Wikipedia Contributors, 20081, 2008as, 2008aw) and we can see
that a user has 6.5 unique passwords in average (Florencio & Herley, 2007), or 4 to 5
unrelated keys (Adams & Sasse, 1999). These are textual secret; whereas graphical
secret has higher memorizability (Standing, Conezio & Haber, 1970; Standing, 1973).
On the other hand, there are 3 conventional mathematical hard problems used
in asymmetric key crypto system, which is also called public-key crypto system.
These problems are integer factorization problem, discrete logarithm pro Diem, and
elliptic curve discrete logarithm problem. NIST categorizes the applications of these
problems for public-key cryptography as integer factorization cryptography (IFC),
finite field cryptography (FFC), and elliptic curve cryptography (ECC), respectively.
IFC has a long key size for public and private keys. FFC has a long public
key and a short private key. ECC has a short key size for public key and private key.
The minimum asymmetric key sizes for IFC, FFC, and ECC in equivalent with the
security levels of symmetric key sizes are shown in Table 3.2 (E. Barker, W. Barker,
Burr, Polk, & Smid, 2007a, 2007b).
Table 3.z Minimum asymmetric Key sizes in equivalent with the security levels of
symmetric key sizes
Security
(bits)
IFC
FFC
ECC
Public
Private
Public
Private
Public
Private
80
1024
1024
1024
160
160
160
112
2048
2048
2048
224
224
224
128
3072
3072
3072
256
256
256
192
7680
7680
7680
384
384
384
256
15360
15360
15360
512
512
512
A good password has to be strong and memorizable (Gehringer, 2002). The
random password with printable ASCII characters is the strongest password but it is
19
poor in memorizability (Yan, Blackwell, Anderson & Grant, 2004). However,
password with good memorizability tends to be weak password and under the
password cracking threats of guessing and dictionary attack (Klein, 1990). As time
lapses, longer key length is needed due to the advancement of computer technology.
Hence, the trend is the strong and memorizable passphrase or special key processing
technique like key strengthening is adopted to get rid of the quest of longer key size.
The most popular email encryption software called Pretty Good Privacy (PGP)
9.0 (PGP Corporation, 2006) allows a maximum of 255 characters to be the
passphrase. Microsoft Windows operating systems also have this feature. Methods
exist on how to create secure keys (Adams, Sasse & Lunt, 1997; Brown, Bracken,
Zoccoli & Douglas, 2004). Therefore, it is a research problem here questioning on
how to have big enough and yet memorizable secret(s) for various applications in
information engineering, generally, and security engineering, particularly.
3.2 Review of the Secret for Symmetric Key Cryptosystem
In civilian information security, according to Kerckhoff s Law, a security
system shall depend fully on the secrecy of a key, and not the algorithmic software
nor its hardware. The main reason for this law is that public confidence has to be
earned to show that there is no backdoor in the security system relying solely on the
secrecy of key, and disclosing its algorithm and hardware to the public, especially
academic and corporate researchers, for comments.
For authentication to a security system, it basically has four methods: Secret
for what you know, token for what you have, biometrics for what you own, and
person for whom you know. Due to the factors of cost, hardware and software
compatibilities, password/key the secret is the most popular. Short key is called
password and long key is called passphrase. The key selection is always the balance
of the factors of memorizability and security. Long and random key is securer but
harder to remember. The current prior art of single-line key input field limits the
practical memorizable key size to a maximum of 128 bits for majority normal users.
To create longer password called passphrase, there are now four existing
methods: Sentence-type passphrase, acronym-type passphrase, diceware, and
20
coinware. Sentence-type passphrase is memorizable and has long key size, but
vulnerable to dictionary attack; whereas acronym-type passphrase taking the first,
last, other locations, or hybrid location is memorizable and resists to dictionary
attack, but has a small key size. Diceware and coinware use several dices and coins,
respectively, to randomly select a word from monolingual, bilingual, or multilingual
wordlists, where they can resist dictionary attack, but memorizablity reduces as the
key size becomes longer. Hence, these passphrase generation methods are still
insufficient to create random, memorizable, and yet big secret, that can resist
guessing attack and dictionary attack, to fulfil the need for secret bigger than 128 bits.
Table 3.3 Various key sizes corresponding to the numbers of ASCII characters,
Unicode (version 5.0) characters, and password units of various secret creation
methods, as well as the settings sufficiency of some key input methods and systems
Key size (bit)
80
96
112
128
160
192
256
384
512
Number of ASCII character (6.57 bits)
13
15
18
20
25
30
39
59
78
Number of Unicode character (16.59 bits)
6
7
8
10
12
16
24
31
Number of CLPW unit (85.41 bits)
1
2
2
2
2
3
3
5
6
ASCII-based (4 * 5) 2D key (131.4 bits)
Yes
Yes
Yes
Yes
No
No
No
No
No
ASCII-based (5 * 6) 2D key (197.1 bits)
Yes
Yes
Yes
Yes
Yes
Yes
No
No
No
ASCII-based (7 * 6) 2D key (275.9 bits)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
Unicode-based (5 * 5) 2D key (414.8 bits)
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
BW multilingual key (16.59 bits)
5
6
7
8
10
12
16
24
31
BW multilingual key + grid (19.79 bits)
5
5
6
7
9
10
13
20
26
Color multilingual key (24.59 bits)
4
4
5
6
7
8
11
16
21
Color multilingual key + grid (27.79 bits)
3
4
5
5
6
7
10
14
19
Multi-tier geo-image key (64.82 bits)
2
2
2
2
3
3
4
6
8
Multi-factor key using software token
Halving the memorizable key sizes of MePKC and other
applications at equivalent security levels by using AES.
N.B.: BW = Black-and-white
According to Bruce Schneier (2006, 2007), for a survey of 34,000 MySpace
users' passwords, about 99% of the passwords have 12 ASCII characters or less. An
21
ASCII character carries about 6.57 bits, which means 99% of the 34,000 MySpace
passwords have 78.84 bits or less. This reflects the facts that almost all the
symmetric keys of the current symmetric key crypto systems in practice reach at a
key size less than 128 bits. In other words, memorizable key the secret is only
practically applicable to the current popular symmetric key crypto systems like 112-
bit 3TDES (3-Key Triple Data Encryption Standard) and 128-bit AES (Advanced
Encryption Standard). However, in a large-scale password habit survey (Florencio &
Herley, 2007), the average password entropy is about 40.54 bits and a user has 6.5
passwords for 25 accounts where 8 accounts in average are used daily.
Table 3.3 shows the numbers of ASCII and Unicode (version 5.0) characters
for various key sizes. In Unicode 5.0, there are 98884 graphic symbols or 16.59 bits
per graphic symbol. The repertoire of Unicode graphic symbols can be upgraded
from time to time in future versions to enlarge the number of graphic symbols.
Memorizable keys for 192-bit and 2^b-bit AES are out of the reach of the current key
management method and system. Hence, need exists to have better key management
method and system to create larger key/password the secret larger than 128 bits.
3.2.1 Related Work: Single-Line Key/Password Field
Conventionally, when secret is used for authentication, single-line key field
will be the area for a user to enter a key. For the current longest possible key, it is a
single-line passphrase. Passphrase can be formed from acronym, sentence, diceware,
and coinware (Lee & Ewe, 2006). Nevertheless, limit exists due to the problems of
memorizability and ASCII character input from keyboard. The first problem is due to
the human factor; whereas the second is due to the user interface. These problems
prohibit the applications of symmetric key sizes at higher security levels, whenever a
user cannot remember and/or conveniently enter a long single-line passphrase.
3.3 Review of the Secret for Asymmetric Key Cryptosystem
Besides the symmetric key cryptography, asymmetric key cryptography or
public-key cryptography (PKC) is one of the two main components in the field of
22
cryptography. PKC emerges in the 1970s (Diffie & Hellman, 1976; Goldwasser,
1997). Symmetric key crypto system has a shared secret key between a pair of users,
but each PKC user has an asymmetric key pair consisting of a private key known
only to the user and a public key shared with the other users. Amazingly, PKC can
solve the key sharing and distribution problems of symmetric key crypto system.
Moreover, PKC can resist the guessing attack, dictionary attack, and pre-computation
attack that symmetric key crypto system is susceptible to. Nevertheless, PKC
processing speea is about 1000 times slower than the symmetric key cryptography.
Consequently, PKC and symmetric key crypto system have to be used in hyond mode
for maximum performance of effectiveness.
Now, there are three main conventional asymmetric cryptosystems: IFC
(Integer Factorization Cryptography), FFC (Finite Field Cryptography), and ECC
(Elliptic Curve Cryptography). IFC is based on the mathematical hard problem of
integer factorization. FFC is based on discrete logarithm problem. And ECC is based
on elliptic curve discrete logarithm problem.
RSA (Rivest-Shamir-Adleman) crypto system is a type of IFC being the very
first practical realization of PKC since 1977. FFC like ElGamal encryption and DSA
(Digital Signature Algorithm), as well as ECC are firstly introduced in the 1980s.
Then, there are other PKC based on different mathematical hard problems but not yet
well- standardized. Nevertheless, so far all the key sizes of asymmetric private key
for IFC, FFC and ECC are too big to be human- memorizable. The large key sizes of
RSA crypto system for its both private and public keys, as well as FFC crypto system
for its public key, have even caused the USA government to shift to ECC having
significantly smaller public and private key sizes. For more details on their
practically secure key sizes, please refer to two NIST articles (E. Barker, W. Barker,
Burr, Polk, & Smid, 2007a, 2007b).
Due to the reason that private key is not fully human- memorizable using the
current prior art, a private key is either fully or partially in the form of a token. In the
mean time among the prior art, there are three basic methods for private key storage:
(i) Encrypted private key stored in the local computing system or device; (ii) split
private key firstly proposed by Ravi Ganesan (1996b) on 18 July 1994 in the US
23
Patent US5557678; and (iii) roaming private key firstly proposed by Cliff A.
Baltzley (2000) on 25 November 1998 in the US Patent US6154543. All the three
methods are bi-factor or multi-factor authentication, where at least one factor is a
secret and another factor is a software token or hardware token.
The first method of private key storage encrypts the private key using a
symmetric key and stores the ciphertext of private key in the local computing system
like hard disk drive or a device like smartcard, floppy disk, or USB flash drive.
Encrypted private key method suffers from the problems of loss, damage, side-
channel attacks, mobility, hardware and software compatibility, and password
domino cracking effect of its digital certificate carrying only one asymmetric public
key.
The second method splits a private key into two or more portions, where the
first portion is a memorizable password or derivable from the memorizable password
kept by the owner of that private key. The second and possible other portions of the
private key are kept by one or more servers in the encrypted form like the first
method. The first, second and possible other split portions of the private key may
also be derived from various authentication factors like token and biometrics. Split
private key method suffers from the problems of malicious central authority attack
on the user's short password, dictionary attack on the stolen encrypted partial private
key, and password domino cracking effect of its digital certificate carrying only one
asymmetric public key.
For the third method, roaming private key also has encrypted private key but
its ciphertext is stored in a network system like server, and owner of the private key
can download it from anywhere and anytime as long as the user has network access.
The roaming private key method suffers from the problems of side-channel attacks,
hardware and software compatibility, malicious central authority, dictionary attack
on the stolen encrypted private key, and password domino cracking effect of its
digital certificate carrying only one asymmetric public key.
In the US Patent US7 113594, Boneh and Franklin (2006) described a new
type of PKC called identity-based cryptography (IDC). In this method, a user's
unique public identity like email or phone number is the public key and hence
24
memorizable. However, its private key is not memorizable and has to be generated
by a trusted third party (TTP).
Notwithstanding , as compared with symmetric key crypto system using
password or key the secret, the popularity of token-based PKC using fully or
partially encrypted private key, is low due to the problems of mobility convenience,
implementation costs, hardware and software compatibilities, and management
difficulty of certificate revocation list. Hence, there exists a need to get rid of fully or
partially encrypted private key, and to invent key input method to let the private key
fully human- memorizable as like the symmetric key.
3.4 Potential Methods to Create Big and Yet Memorizable Secret
One of the many invented methods here to create big and yet memorizable
secret is to innovate the graphical password or picture password. From psychological
studies, it claims that human graphical memory is stronger than human textual
memory. The graphical password is categorized into recognition-based and recall-
based methods by Xiaoyuan Suo, Ying Zhu, and G. Scott Owen (2005). For
recognition-based method, it can be the types of cognometrics and locimetrics.
Meanwhile for recalled-based method, it can be the type of drawmetrics.
Passfaces invented by J. H. E. Davies (1997), as in the US Patent US5608387,
is a type of cognometircs, where a user is requested to recognize some pre- selected
image sequence of human faces as password. Davies' s method has the weakness of
low entropy per image. For G. Blonder' s method (1996), as in the US Patent
US5559961, it is a type of locimetrics, where a user has to select a few areas of an
image in sequence as password. Blonder' s method is vulnerable to hot-spot attack
and shoulder- surfing attack. For Draw-a-Secret scheme by L Jermyn, A. Mayer, F.
Monro se, M. Reiter, and A. Rubin (1999), it is a type of drawmetrics, where a user
draw lines and points on a grid in the form as like a hidden hand signature. For this
Draw-a-Secret scheme, its weakness is its authentication process for either
acceptance or rejection is not exact as in the previous two graphical password
methods, but estimation having FAR (False Acceptance Rate) and FRR (False
Rejection Rate).
25
Besides these three main groups of graphical password, there are icon-like
graphical password scheme by P. V. Haperen (1997), as in the UK Patent
Application GB23 1 3460, and event-based graphical password scheme by J.
Schneider (2004), as in the US Patent Application US2004/0250138. The both of
these latter methods are cognometric. Their common weakness is that the key space
or password space is limited by the fine differentiation capability of human visual
memory over images that may have only minor differences. This causes the entropy
per image selection to be still unsatisfactory not big enough for the demands of
information engineering for the stronger security levels to carry more bits of strength.
Hence, there exists a need to boost the key space of graphical password for higher
entropy per image selection and yet still human- memorizable and visually
differentiable.
Another potential method to have big memorizable secret is to create Chinese
language password (CLPW) through Chinese character encodings and their
Romanization. T. D. Huang, as in the US Patent US4500872, proposed on 19
February 1985 to use phonetic encoding and symbolic encoding to represent a
Chinese character. The character space of Chinese language is huge by more than 16
bits per character and yet human- memorizable and differentiable. This CLPW
method can also be extended to other CJKV languages due to the common sharing
for the usages of Han characters (漢字 or 汉字) like Chinese Hanzi, Japanese Kanji,
Korean Hanja, and Vietnamese Han Tu. However, the current CLPW has a weakness
that it is subject to dictionary attack. Hence, there exists a need to create CLPW
resisting the dictionary attack.
There are some inventions to create password that can resist the dictionary
attacks. Among them are (i) "System and Method for Generating Unique Passwords"
by Martin Abadi, Krishna Bharat, and Johannes Marais (2000) in the US Patent
US6141760; (ii) "Password Generation Method and System" by M. R. McCulligh
(2003) in the US Patent US6643784; (iii) "Method and System for Automated
Password Generation" by P. M. Goal and S. J. Kriese (2004) in the US Patent
Application US2004/0 168068; (iv) "Method and Apparatus for Password
Generation" by M. R. Dharmarajan (2005) in the US Patent Application
US2005/0 132203; and (v) "Method and System for Generating Passwords" by B. E.
26
Moseley (2006) in the US Patent Application US2006/0026439. Nevertheless, even
though these five methods can resist dictionary attacks, they have lower
memorizability. Hence, there exists a need not only to have a password generation
method that can resist dictionary attack, but can have high memorizability as well
even for a big secret at least and beyond 128 bits.
Yet another method to create a memorizable secret bigger than the current
prior art was proposed by Whitfield Diffie and William A. Woods (2006) in their
patent application filed on 22 June 2006 entitled "Method for Generating Mnemonic
Random Passcodes", US Patent Application US2007/0300076. However, the
password created by this method is not yet big enough for many applications in the
information engineering.
3.5 Methods and Systems to Create Big Memorizable Secret
Accordingly, the present invention mainly provides some methods and
systems to create big memorizable secrets. These methods and systems include (i)
self-created signature-like Han character; (ii) two-dimensional key (2D key); (iii)
multilingual key; (iv) multi-tier geo-image key; and (v) multi-factor key using
software token. Every method and system can be used individually or mixed as a
hybrid combination. The size of big memorizable secret is at least 128 bits. Figure
3.1 illustrates the main and basic operations for the generations and applications of
one or more big memorizable secret(s).
3.6 Potential Applications of Available Big Memorizable Secret
With the realization of big memorizable secret, not only the big secret keys of
symmetric key crypto systems of higher security strength like AES-192 and AES-256
can be realized firstly, but memorizable public-key crypto system (MePKC) secondly,
and other cryptographic, information-hiding, and non-cryptographic applications
thirdly, in the field of information engineering that need big and yet memorizable
secret.
27
100
V
User selects one or a mixture of the methods as follows to create
one or more big memorizable secrets in a computing device:
(1) Self-created signature-like Han character of CLPW & CLPP
(2) Two-dimensional key (2D key)
(3) Multilingual key
(4) Multi-tier geo-image key
(5) Multi-factor key using software token
101
102
The created secret is used as password, passcode (aka pin), symmetric key,
asymmetric private key, stego-key, symmetric watermarking key, asymmetric
watermarking private key, PRNG seed, etc., for one or a mixed combination of the
systems as follows in the field oi information engineering:
(1) Cryptographic applications like 256-bit AES, DSA, ECC, MePKC
(2) Information-hiding applications like steganography, watermarking
(3) Non-cryptographic applications like PRNG, CSPRBG
V
Perform one of the many functions as follows:
(1) Creating an asymmetric public key using an asymmetric private key
(2) Encrypting using a symmetric key, stego-key
(3) Decrypting using a symmetric key, stego-key, asymmetric private key
(4) Signing using an asymmetric private key
(5) Embedding using a symmetric watermarjang key, asymmetric WM private key
(6) Verifying using a symmetric watermarking key
(7) Creating an HMAC (Keyed-Hash Message Authentication Code) using a secret key
(8) Seeding PRNG, CSPRBG
(9) Other functions using secret(s)
After finisning the process using the secret, do either one of the
processes as follows before the application is closed:
(1) Delete the secret immediately during or after the application
(2) Store the secret for limited time
(3) Store the secret for limited amount of usages
(4) Store the secret for limited amount of usages per unit of time
/X7l
104
Figure 3.1 Generations and applications of one/more big memorizable secrets
28
These cryptographic applications include cryptographic schemes like
encryption, signature, key exchange, authentication, blind signature, multisignature,
group-oriented signature, undeniable signature, threshold signature, rail- stop
signature, group signature, proxy signature, signcryption, forward- secure signature,
designated- verifier signature, public-key certificate (aka digital certificate), digital
timestamping, copy protection, software licensing, digital cheque (aka electronic
cheque), electronic cash, electronic voting, BAP (Byzantine Agreement Protocol),
electronic commerce, MAC (Message Authentication Code), key escrow, online
verification of credit card, multihash signature, etc.
Those information-hiding applications include steganographic and
watermarking schemes like stego-key in steganography, secret key in symmetric
watermarking, private key in asymmetric watermarking, etc. Meanwhile, the non-
cryptographic applications are PRNG (Pseudo-Random Number Generator) and
CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator). Hence, there
exist lots of needs to have big memorizable secret for lots of cryptographic,
information- hiding, and non-cryptographic applications in the field of information
engineering, generally, and security engineering, particularly.
3.7 Future Development of Keys the Secret
These keys the secret need good generation methods (Scalet, 2005) and key
management (Fumy & Landrock, 1993; Beach, 2001; Witty, 2001). Wailgum (2008)
questioned on whether there were too many passwords or humans were lacking of
memory power. In term of memory, there are two forms: Recognition-based and
recall-based. Weinshall and Kirkpatrick (2004) presented those recall-based
passwords. Bill Gates with Microsoft has once claimed the ending of the passwords
(Allan, 2004; Kotadia, 2004; Fried & Evers, 2006).
Subsequently, there are introductions of some password alternatives like
Information Card (Wikipedia Contributors, 2008ap), Windows CardSpace (Wilson,
2008), Higgins Project, OpenID (Wikipedia Contributors, 2008am), Identity
Metasystem (Jones, 2005; Cameron & Jones, 2006), Identity Selector, digital identity
29
(Cameron, 2005; Cavoukian, 2006; Wikipedia, Contributors, 2008al), Authorization
Certificate, Extended Validation Certificate, etc.
Furnell (2005) analyzed whether human could get rid of passwords and
concluded that passwords could not be replaced. Here, if the inventions and
innovations on big secret(s) creation methods and their applications are adopted,
especially MePKC (Memorizable Public-Key Cryptography), the complicated
mentioned password alternatives may be made simpler or at best be avoided. More
literatures on password are available at PasswordResearch.com website [URL:
www.passwordresearch.com] .
For security of asymmetric key crypto systems, the mathematical hard
problems depend on the researchers' creativity and innovation as well as the
computing technologies to crack them. For example, the cryptanalytic attacks like
Wiener (1990) and so on, that can be discovered in the future, may request for longer
asymmetric key sizes and/or other mathematical hard problems. Challenges with
awards offered by the PKC services providers to crack certain PKC with certain key
sizes are always there for the public to attempt.
Anyway, the practically secure key sizes for symmetric and asymmetric key
crypto systems at different protection periods are always under the regular
evaluations by a lot of researchers (Williams, 2002). Website of KeyLength.com
[URL: www.keylength.com] ("Cryptographic Key Length Recommendation," No
date) is a collection database for lots of documentations on these practically secure
key sizes for various applications in security engineering, particularly, and
information engineering, generally.
30
CHAPTER 4 CREATING BIG MEMORIZABLE SECRET
(PART 2)
4.1 Passphrase Generation Methods
Civilian crypto system applies Kerckhoff s law to have security dependency
100% on the password secrecy. This reflects the fact that key length and key space
are very important to ensure enough entropy or randomness to secure a crypto system.
For stronger password, passphrase is suggested. Currently, there are three methods to
generate passphrase: Acronym, full sentence and diceware. Here, an alternate method
to diceware is proposed: Coinware (Lee & Ewe, 2006), by using the coin. Coinware
uses four coins to generate one hexadecimal digit. The created word lists are in
hexadecimal order and can be applied for multilingual passphrase generation. Its
exemplary application for Chinese language password is then shown. Readily-made
Chinese character word list in the Unicode CJK unified ideographs enables fast
hexadecimal reading for random passphrase generation. Hanyu Pinyin and Sijiao
Haoma are used to Romanize and uniquely represent each Han character. Jyutping
and Romaji are then used for Cantonese and Japanese languages, respectively.
Table 4. 1 Passphrase generation from acronym
Sentence
Passphrase
Passwords should be impossible to remember and never written down
psbitranwd
Passwords should be impossible to remember and never written down
PsBiTrAnWd
Good or bad, you have to do it.
Goby,htdi.
Good or bad, you have to do it.
Drd,ueoot.
It may be a few sentences. One, two or more.
Imbafs.O,tom.
4.1.1 Acronym
For the passphrase created using the acronym (Schneier, 1996; PGP
Corporation, 2006; Yan, Blackwell, Anderson & Grant, 2004), a user has to
remember one or a few sentences. Then, the first, second, or last, etc. characters of
each word in the sentence(s) are joined to form an acronym. Both alphanumeric and
31
non-alphanumeric ASCII characters may become the character of the acronym. The
techniques of capitalization and permutation may be used to increase the randomness.
This acronym will then act as the key. It has the features of high randomness and
short key length. The examples of this method are in Table 4.1.
4.1.2 Full Sentence
The passphrase generation using the acronym is sufficient if the key length
requirement is short. When the minimum key size demand is long, normally one full
sentence or a few short sentences are entered directly as the key (Schneier, 1996;
PGP Corporation, 2006; Yan, Blackwell, Anderson & Grant, 2004). So far, it is an
open problem to type the entire phrase into a computer with the echo turned off
(Schneier, 1996). If the masked password is shown during the password entering
process, then it will subject to shoulder surfing attack.
Besides, since the passphrase of full sentence has each word to be selected
associatively, its randomness is magnitude-wise high but relatively low if password
ciphertext is available. For example, superuser of any computing system can easily
obtain ciphertext of the password. By gaining access to the encrypted password, the
threats of ciphertext-only attack and frequency analysis of short cryptogram (Hart,
1994; Lee, Teh & Tan, 2006) are then possible. For instance, the unicity distance of
English language is about 30 characters. Once the encrypted password is equal to or
more than the unicity distance, unique decipherability of the encrypted password will
be feasible.
4.1.3 Diceware
Using full sentence for passphrase generation, the word frequency
distribution can be under computational analysis (Kucera & Francis, 1967). To get
rid of the association of words, diceware (PGP Corporation, 1996) introduced by A.
G. Reinhold is an improved passphrase generation method.
There are many software pseudo-random number generators (PRNGs).
Unfortunately, they have lots of pitfalls (Eastlake, Crocker & Schiller, 1994) to ease
32
any possible attack. Hence, some hardware random number generators (RNGs) such
as coin and dice are very much better than the software PRNGs.
Diceware uses dice to select a word from an ordered word list. The word list
can be in any language and based on senary or base-6 numeral system. For the most
popular diceware, it is an English word list with 7776 (= 6 5 ) words. Five dice values
are needed to locate one word randomly. Every selected word carries entropy of
12.92 bits. Table 4.2 shows the minimum diceware words for different security levels.
Table 4.2 Minimum diceware words (7776 word list) for different security levels
Key Size (bit)
32
64
72
80
112
128
256
Diceware
word
3
6
7
9
10
20
bit
38
64
77
90
116
129
258
4.1.4 Coinware
In addition to diceware using dice, coinware using coin is proposed here.
Coin tossing is conducted to generate random passphrase. Each face of the coin is
labeled as binary bits "0" and "1", respectively. Four coin values are used to derive a
hexadecimal digit. Therefore, the word list is in hexadecimal order. Table 4.3 shows
the conversions between the binary (BIN) and hexadecimal (HEX) numeral systems.
Table 4.3 Conversions between binary and hexadecimal numeral systems
BIN
HEX
BIN
HEX
BIN
HEX
BIN
HEX
0000
0100
4
1000
8
1100
C
0001
1
0101
1001
9
1101
D
0010
2
0110
6
1010
A
1110
E
0011
3
0111
1011
B
1111
F
4.1.5 Monolingual, Bilingual, and Multilingual Word Lists
Having word list and random number generator, computational analysis on
word frequency distribution is avoided and random passphrase generation is ensured.
For the word list, one may use readily made word list or prepare a new word list.
33
For readily made word list, it is normally monolingual unless one combines
two or more monolingual word lists with different languages. To prepare a new word
list, one may go for monolingual, bilingual, or multilingual to suit one's linguistic
ability. The purpose to have word list consisting of more than one language is to
increase the key space and consequently the key entropy per word.
For the word list, each word has to be unique, short, and memorizable. Start
with the shortest word. Then slowly increase the character length of the word until
the key space setting of the word list is met. To be easy, one may set the key space of
monolingual word list to 4096 (= 2 12 ) or 8192 (= 2 13 ) words. Two or more
monolingual word lists can be joined to form bilingual or multilingual word lists.
Nowadays, when language proficiency is excluded, bilingual or multilingual
people ("Mother Tongue," No date; Paradowski, No date; Wikipedia Contributors,
2008p, 2008aa, 2008ab, 2008ae, 2008av) exceed the monolingual people (Wikipedia
Contributors, 2008a), where English language is a second language due to its soft
power of computer language in the recent decades and hard power of British Empire
and American influence since the 19 th century (Wikipedia Contributors, 2008bb,
2008bc). The language studies (Matthews, 1997; Crystal, 1999; Finegan, 2004;
Gordon, 2005; Wikipedia Contributors, 2008ai) are based on text corpus (Wikipedia
Contributors, 2008z), branching into a few fields like theoretical linguistics, applied
linguistics, and corpus linguistics (Wikipedia Contributors, 2008h, 2008u, 2008y).
The language policy (Wikipedia Contributors, 200 8j) of a country has
determined the language(s) in education and the speakers of a language. There are
various languages spoken and written by various people from different countries
(Wikipedia Contributors, 2008c, 2008m, 2008p, 2008ac, 2008ad, 2008aq, 2008ar,
2008au). For example, there is a statistical analysis of Chinese language (Zhang, Xu
& Huang, 2000). Till here, we can see that the bilingual and multilingual word lists
have their demands and can increase the key space of coinware for higher complexity.
4.1.6 Key Length Requirements of Coinware
It is important to know the key size equivalence for symmetric and
asymmetric (RSA, discrete logarithm and elliptic curve) crypto systems (Schneier,
34
1996; Williams, 2002; Gehrmann & Naslund, 2005, 2006, 2007) for different
security levels. Tms step enables a user to prepare suitable and sufficiently strong
password or passphrase before opening an account and conducting an encryption.
Table 4.4 shows this important information (Williams, 2002).
Table 4.4 Key size equivalence for symmetric and asymmetric crypto systems (bit)
Symmetric Key Size (bit)
48
64
80
112
128
192
256
RSA
480
816
1248
2432
3248
7936
15424
Discrete
Logarithm
Field Size
480
816
1248
2432
3248
7936
15424
Subfield
96
128
160
224
256
384
512
Elliptic Curve
96
128
160
224
256
384
512
The minimum coinware word relies on the key space of the word list. The
monolingual, bilingual, or multilingual word lists of 4096, 8192, 12288, 16384, and
24576 words have entropies per word of 12, 13, 13.58, 14, and 14.58 bits,
respectively. Table 4.5 shows the minimum coinware words for various word list
sizes (WLS).
Table 4.5 Minimum coinware words for various word list sizes (WLS)
Symmetric Key Size (bit)
48
64
80
112
128
192
256
WLS 4096
word
4
6
7
10
11
16
22
bit
48
72
84
120
132
192
264
WLS 8192
word
4
7
9
10
15
20
bit
52
65
91
117
130
195
260
Coinware
WLS 12288
word
4
6
9
10
15
19
bit
54
67
81
122
135
203
258
WLS 16384
word
4
6
8
10
14
19
bit
56
70
84
112
140
196
266
WLS 24576
word
4
6
8
9
14
18
bit
58
72
87
116
131
204
262
The current common demands of security levels are 80- and 128-bit for the
symmetric crypto system. These security levels ensure protection of 5 and 30 years,
respectively. From Table 4.5, word list size of 8192 is suitable for monolingual and
35
bilingual users. Monolingual users can use a monolingual word list of 8192 words.
Meanwhile, bilingual users can use two unique monolingual word lists of 4096
words each. For multilingual users, word list size of 24576 is suggested where three
unique monolingual word lists of 8192 words each can be used.
4.2 Chinese-Character-Encoded Passphrase
For coinware applications, there are readily-made word lists in Unicode (The
Unicode Consortium, 2006) for various languages. This is because both coinware
and Unicode are in the hexadecimal order for their word lists. This is especially true
for the CJK languages of Chinese language, Japanese language, and Korean language
that use the Han characters. Word list is also a character list for CJK languages. Here,
we discuss on the Chinese language password generation with optional coinware.
In computing system, password is dominated by Roman alphabet or Latin
alphabet due to character encoding of ASCII. Here, a pronounceable and
memorizable password policy in Chinese language is proposed. Phonetic encoding of
Hanyu Pinyin (Popular Book, 2003) and symbolic encoding of Sijiao Haoma (or four
corner method) (Wikipedia Contributors, 2007a) are used to create the uniqueness of
each Chinese character or Han character for alphanumeric representation.
Based on about 70229 Han characters in the Unihan database of CJK
ideographs for the version of Unicode 4.1, each Han character has entropy of 16.1
bits. Five Han characters will satisfy the 80-bit minimum randomness requirement of
symmetric key crypto system for strong password. Self-created signature-like Han
character and passphrase represented by printable ASCII generates shorter, stronger
and more memorizable passwords with 27.3 and 85.4 bits per Han character,
respectively. Other CJK languages using the Han characters like Cantonese language
and Japanese language are also applicable via the pronunciation Romanization
systems of jyutping and romaji, respectively.
Han character is also called Chinese character (Wikipedia Contributors,
2007h). For the Chinese character input methods, they are either based on
pronunciation, character structure, or a combination of pronunciation and character
structure (Wikipedia Contributors, 2007c). These methods are closely linked to
36
Chinese character encodings (Wikipedia Contributors, 2007d) to allow a user to enter
a Chinese character. A user normally remembers the pronunciation and/or character
structure of a Chinese character to facilitate its input.
Huang (1985) proposed a type of Chinese character encoding to ease Chinese
input by using the combination of pronunciation and character structure. This kind of
Chinese character encoding can create a key per Chinese character. The maximum
size of this encoding is six characters, where there are three characters for phonetic
sound, one character for tone, and two characters for character structure. The
memorizability of this Chinese-character-encoded key is better than the Environ
password, but its security is subject to dictionary attack.
4.2.1 Environ Password
An analogue to the Romanization of Chinese language to have alphabets and
digits is the Environ password (Anderson, 2001, p. 49). Good memorizability exists
when it is linked to a learnt language. For English language, U.K. government
introduced the case insensitive Environ password in October 2005 for short-term
protection (Wikipedia Contributors, 2007b). It has an 8-character key pattern as in
Table 4.6. This pronounceable password has 34.9 bits per unit.
Table 4.6 Environ password
Form
[consonant - vowel - consonant - consonant - vowel - consonant - digit - digit]
[consonant - vowel - consonant - digit - consonant - vowel - consonant - digit]
Example
pinray34, yankan77, supjey56, kinkin99; pin3ray4, yan7kan7, sup5jey6, kin9kin9
4.2.2 Unicode
Unicode unifies the Han characters of CJK languages into CJK unified
ideographs or Unihan under ISO 10646. There are three major blocks of Han
characters or Chinese characters in the Unicode character encoding: CJK unified
ideographs, CJK unified ideographs extension A, and CJK unified ideographs
extensions B. For the mean time, Unicode Consortium is preparing the CJK unified
ideographs extension C and CJK unified ideographs extension D (Wikipedia
37
Contributors, 2008at). The CJK unified ideographs extension C with 4251 Han
characters will be included into the next version after Unicode 5.1.
For Unicode 4.1, the first block lists the Han characters from [4E00] to
[9FBB] in hexadecimal value. The second block lists from [3400] to [4DB5]. The
third block lists from [20000] to [2A6D6]. Hence, there are three readily made word
lists or character lists for Chinese language. These word lists have 20924, 6582 and
42711 words or characters, respectively. In addition, there are CJK compatibility
ideographs having 12 characters. For a combined word list, it is a key space of 70229
characters. After radical exclusion, the key space has about 70000 characters. This
forms a Chinese language word list with high entropy of 16.10 bits per Han character.
To start coinware, first flip or toss a coin to randomly select a binary bit "0"
or "1". If bit "0", the first and second blocks of CJK unified ideographs and CJK
unified ideographs extension A are chosen. If bit "1", the third CJK block of CJK
unified ideographs extension B is chosen. Then continue with coin tossing to obtain
four coin values representing four binary bits. These four binary bits are converted
into one hexadecimal digit. Repeat coin tossing to get four coin values for another
three rounds. Four randomly obtained hexadecimal digits will locate the unique Han
characters in the previously selected CJK block(s). These three blocks are available
at [URL: http://www.unicode.org/charts/]. If the hexadecimal digits do not hit any
Han character, get another set of hexadecimal digits. Coming to here, the selected
Han character will need Chinese character Romanization to enable computer input.
4.2.3 Chinese Language Password (CLPW)
Zhonghua Zihai in 1994 has 85,568 Chinese characters (Wikipedia
Contributors, 2007d). It means a Chinese character may have entropy of 16.38 bits
when the Unicode Unihan database is further enlarged. For key security, this is an
advantage over the 6.57-bit ASCII characters, which are used for the Latin languages.
For computers with support of Chinese character encoding, Chinese language
password (CLPW) is shorter for the similar key size of ASCII-based password. This
indicates better memorizability. For computers without support of Chinese character
38
encoding, which are general for majority of the computers, Romanization of Chinese
language is needed to create the same advantage in term of memorizability.
Chinese input methods and Chinese character encodings can be used to
Romanized CLPW. The Romanization of Chinese language is either based on
pronunciation, character structure, or a combination of the both. To uniquely
represent a Chinese character, Huang (1985) has a good reference for CLPW
Romanization, where both Huang pronunciation and character structure are used to
create a Chinese-character-encoded word with a maximum of 6 characters.
However, this approach requires modernization. The pronunciation system of
Hanyu Pinyin (汉 语拼" ir) (Popular Book, 2003) and character structure system of
Sijiao Haoma or four-comer method ( 四角 号 石马) (United Publishing House, 2001,
2002; Wikipedia Contributors, 2007a) are proposed to create a Chinese language
password. In Hanyu Pinyin, there are 415 unique syllables with 22 initials (or onsets)
and 39 finals. This pronunciation system is illustrated in Table 4.7.
Table 4.7 Phonetic encoding of Hanyu Pinyin (Mandarin-based)
Initial
(22)
nil
b
P
m
f
d
t
n
1
g
k
h
j
q
X
z
c
s
zh
ch
sh
Final
(39)
a
e
ai
ei
ao
ou
an
en
ang
eng
ong
ia
io
ie
iao
iu
ian
in
iang
ing
iong
u
ua
uo
uai
ui
uan
un
uang
ueng
ii
iie
iian
iin
er
N.B.: For Romanization, e and u can be represented by [oe] and [v], respectively.
In addition to initials and finals, there are 5 tone marks. These tone marks are
numbered as 1, 2, 3, 4 and d in corresponding with Yinping (阴 平) , Yangping
( 阳^ F ) , Shangsheng (上 尸ノ , Qusheng ( 去声 ) and Qingsheng ( 轻声 ) .
Then, the 4+1 -digit Sijiao Haoma is added to describe the character structure
of a Chinese character. The upper left number is the first digit. The upper right
39
number is the second digit. The lower left number is the third digit. The lower right
number is the fourth digit. The fifth digit is Fuhao or attached number (附 号) ,
which represents the middle character structure on the right hand side. Figure 4.1
shows a Cmnese poem to easily memorize the Sijiao Haoma. Table 4.8 shows the
strokes represented by Sijiao Haoma.
横 ᅳ 垂 二三 点 掠
叉 四插五 方框六
七 角 八 八 九是小
点 下 有 横 变零头
Figure 4.1 Chinese poem ror easy memorization or Smao Haoma
Table 4.8 Character structure encoding of Sijiao Haoma
Stroke name (笔 名)
Digit (号 码)
Stroke (笔 形)
Tou (头)
、 .
Heng (横)
1
Chui (垂)
2
I i J
Dian ( 点 )
3
Cha (叉)
4
十 J、
Chuan ( 串 )
^ 丰
Fang ( 方 )
6
P □
Jiao (角)
ᄀ 厂
Ba (八)
8
A 入 入
Xiao (/]、)
9
小 十
lable 4.9 Forms of Romanized Chinese-character-encoded words
Form
[Hanyu Pinyin] (Tone Mark) [Sijiao Haoma] (Fuhao)
Example
han3714
han43714
han37140
3714han
3H7A1N4
Finally, the Hanyu Pinyin, tone mark, Sijiao Haoma, and Fuhao are joined to
form a Romanized Chinese-character-encoded word as in Table 4.9 for the Chinese
character of Han (汉) . Tone mark and Fuhao are optionally included. For the
computer input or cLPW for Han character, the Hanyu Pinyin and Sijiao Haoma can
40
be typed side by side. If the coin tossing gives a 5-digit hexadecimal string of
[06C49], then the Han character of (汉) is selected from the Unicode. Table 4.9
shows the possible forms for the Chinese character Romanization of (汉) [Hanyu
Pinyin = han4] [Sijiao Haoma = 37140].
This creates a Chinese-character-encoded word ranging from 5 to 12 ASCII
characters. Several Chinese-character-encoded words can be used as a Chinese
language password. The capitalization and permutation can slightly increase the
entropy. However, it is suoject to dictionary attack.
4.2.4 Key Length Requirements for Coinware in Chinese Language
Referring to the created Han character combined list in Section 4.1, it is 16.10
bits per Han character. Using this key entropy, minimum coinware words at different
security levels for Chinese language password can be derived as in Table 4.10.
Due to high key entropy of Chinese language word list, it is obvious to
observe the significant drop of minimum coinware words as from Tables 4.5 and
4.10. As Japanese language and Korean language are using the Han characters as
well, similar word lists with large key space can be created. For Chinese language
family, it is applicable to Mandarin, Wu, Cantonese, Min, Jin, Xiang, Hakka, Gan,
Hui, and Ping languages/dialects with speaking population of 800, 90, 80, 50, 45, 35,
35, 20, 3, and 0.2 millions, respectively.
Table 4.10 Minimum coinware words for Han character combined list (70229 words)
Symmetric Key Size (bit)
48
64
80
112
128
192
256
Coinware
(Chinese Language)
word
3
4
5
8
12
16
bit
48
64
80
112
128
193
257
4.2.5 Self-Created Signature-like Han Character
The combination of 415 Hanyu Pinyin syllables, 5 tone marks, and 10,000
Sijiao Haoma numbers are more than enough to encode all the Han characters
41
available at present. In order to increase the randomness or entropy of Han character,
the creation of new Han character is a must.
This situation happens in real life for the individual name in gaining
uniqueness. The created Han character is also signature-like. For Han character
creation, it may follow the six methods of Liushu (六 书) (Huang, 2002). The
Liushu includes Xiangxing (象形) (picto grams), Zhishi (指 事) (ideograph),
Huiyi (会意) (logical aggregates), Xingsheng (形 尸ノ (pictophonetic
compounds), Jiajie (假 借) (borrowing), and Zhuanzhu (转汪 ) (associate
transformation) (Wikipedia Contributors, 2007h; Xu, 2001; Luo, 1990, 2003).
Figure 4.2 Example of self-createa signature-like Han character by modifying the
Han character of (汉) from [Hanyu Pinyin = han4] and [Sijiao Haoma = 37140] to
[Hanyu Pinyin = han4] and [Sijiao Haoma = 37141]
An example of created Han character is shown in Figure 4.2. The Han
character of (汉) is modified from [han437140] to [han437141] by adding a
horizontal stroke between the upper right corner and lower right corner. Self-created
signature-like Han characters enlarge the key space of Chinese language password to
4,150,000. When tone mark and Fuhao are included, it becomes 207,500,000 or
entropy of 27.63 bits per Han character. The efficiency of Chinese language
password is greatly increased.
4.2.6 Self-Created Chinese Language Passphrase (CLPP)
To further increase the entropy of Chinese language password, we can have
self-created Chinese language passphrase (CLPP). At least one non-alphanumeric
character has to be included together with capitalization, permutation, character
stuffing, and text-based semantic noises. Character stuffing is like bit stuffing in data
42
communication to enable the syllable length at a fixed value of 6. It is 6 because the
maximum syllable length is 6, excluding the tone mark.
Adding fixed syllable length, tone mark, Sijiao Haoma with Fuhao, and one
non-alphanumeric character together, a string of 13 ASCII characters is obtained as a
basic unit of a self-created CLPP. The non-alphanumeric character is used as a
separator and text-based semantic noise.
Table 4.10 shows examples of self- created CLPP. This Chinese-character-
encoded passphrase has 85.41 bits per Han character. It has good memorizability,
resistance to dictionary attack, and suitability for general password usages.
Table 4.11 Forms of self-created Chinese language passphrase for ( 汉 )
Form
No character stuffing
With character
stuffing & noise
Capitalization &
permutation
Example
han4&37140
h@n4«* & 37140
37140&HaN4*"
4.2.7 Cantonese Language Password Using Jyutping
Han unification of Unicode builds Han characters database for CJK
languages (Chinese, Japanese, and Korean). The proposed password and passphrase
generation method can be applied to any CJK languages using the Han characters by
changing the pronunciation Romanization system. The character structure encoding
of Sijiao Haoma remains the same for all the Han characters in any CJK languages.
Cantonese language is used by a global population of about 80 millions.
Being the official language in Hong Kong SAR (Special Administrative Region) and
Macau SAR of PRC (People's Republic of China), the regulation works of
Cantonese language are done here. It shares majority of the Han characters with
Chinese language in Mandarin except those Han characters in the HKSCS (Hong
Kong Supplementary Character Set). For HKSCS-2004, it has 4941 Han characters
as in year 2004 under ISO 10646 standard. Hence, it is compatible with Unicode,
which implements the ISO 10646 standard.
43
There are many Cantonese pronunciation systems. Among them, two systems
are Romanized and computer friendly. One of them is the standard Cantonese pinyin
or HKED ( 《常用 字廣州 話讀音 表》 拼音方 案) ( 「教院 式」 拼音方 案) .
This is the only pronunciation Romamzation svstem accented bv Education and
Manpower Bureau of Hong Kong and Hong Kong Examinations and Assessment
Authority. Another is jyutping proposed by LSHK (The Linguistic Society of Hong
Kong) in year 1993.
Nowadays, regulation works of Cantonese pronunciation for Unicode adopt
jyutping system. Han characters in Unicode are matched with jyutping, where the
lists are downloadable from the URLs of [http://www.isol0646hk.net/jp/index.jsp]
and [http://www.info.gov.hk/digital21/eng/structure/jyutping.html].
Jyutping can also be applied into the coin tossing of coinware. As for the
hexadecimal strings of [03400], [04E00], and [0E000], the jyutping for these
Cantonese characters are [jaul], [jatl], and [mou5], respectively.
Table 4.12 Phonetic encoding of jyutping in Cantonese language
nil
b
P
m
f
d
t
n
1
Initial (20)
g
k
ng
h
gw
kw
w
z
c
s
j
ip
it
ik
im
in
ing
iu
yu
yut
yun
u
up
ut
uk
um
un
ung
ui
e
ep
et
ek
em
en
eng
ei
eu
Final (59)
eot
eon
eoi
oe
oet
oek
oeng
ot
ok
on
ong
oi
ou
ap
at
ak
am
an
ang
ai
au
aa
aap
aat
aak
aam
aan
aang
aai
aau
In jyutping system, there are 20 initials and 59 finals as in Table 4.12. These
initials and finals construct about 629 syllables for Cantonese language as compared
44
to 415 syllables for Chinese language in Mandarin. For tone mark, 6 distinct tone
contours are used for 9 tones. For completeness, the jyutping has syllables that have
no matching Han character. Nevertheless, in the application for Cantonese language
password, all jyutping syllables may be useful for self-created password.
Table 4.13 shows the examples or Cantonese language password. It is similar
to Chinese language password in Mandarin. Sijiao Haoma is exactly encoded. For
jyutping, the maximum syllable length is 6. Capitalization, permutation, and
character stuffing can be used to generate self-created signature-like Cantonese
language password and passphrase. The key space of self-created Han characters in
Cantonese can reach 377,400,000 keys or 28.49 bits per Han characters.
Table 4.13 Forms of self-created Cantonese language passphrase for (汉)
Form
Traditional Chinese
(漢)
Simplified Chinese
(汉)
With character stuffing
Example
hon3&34185
hon3&37140
hon3*** & 34185
4.2.8 Japanese Language Password Using Romaji
In Japanese language, there are four writing systems: Two syllabaries of
Hiragana (平仮名) and katakana (片仮名), one logogram of kanji (漢字), and one
Romanization of romaji (ローマ字). The most widely used Hepburn Romanization
is adopted for romaji. The password generation method for Chinese language
password can be used for Japanese kanji via the combination of romaji and Sijiao
Haoma.
Firstly, obtain the Sijiao Haoma with Fuhao for the Japanese word in kanji.
Then, the kanji is converted to romaji for pronunciation Romanization. Character
stuffing is longer for Japanese language password as the kanji is having variable
number of syllables from a minimum of one syllable. For Hepburn Romanization,
there are about 132 syllables.
Table 4.14 shows examples of kanji passwords. To avoid dictionary attack,
self-created kanji with character stuffing, capitalization, and permutation, as in
45
Section 4.2.5 can be used. Coinware allows random selection of Han characters (Lee
& Ewe, 2006).
Table 4.14 Forms of Japanese language password for (大 ) , (漢 ) , and (山)
Form
dai (大) (だい)
kan (漢) (かん)
yama (山) (や ま )
Example
dai&40800
kan&34185
yama&22770
4.2.9 Key Length Requirements for Various Chinese Key Spaces
For unbreakable encryption, the key size has to be at least the same with
message size as in one-time password (Shannon, 1949). So far, the full Unihan
database of 70229 Han ideographs in Unicode 4.1 is used to build the Chinese
language password and passphrase. In the Han unification of Unicode, Han
ideographs are called as Hanzi in Chinese language, Kanji in Japanese language, and
Hanja in Korean language.
If only the basic Unihan database of 20948 Han ideographs in the CJK
unified ideographs are used, by excluding the CJK unified ideographs extension A
and CJK unified ideographs extension B, the entropy will drop from 16.10 to 14.35
bits per Han character. Then more Han characters are required to fulfil the key length
requirements. Hence for short, strong, and memorizable password, self-created
signature-like Chinese language password and passphrase are in favourite. The
situation of various Chinese key spaces is shown in Table 4.15.
Table 4.15 Minimum key lengths for various Chinese key spaces (in Han character)
Database
Key Space
Entropy
(bit 1 Han char.)
Minimum Key Length
(in Han character)
80-bit
128-
bit
192-
bit
256-
bit
Basic Unihan
20948
14.35
6
9
14
18
Full Unihan
70229
16.10
5
8
12
16
Self-created Han Character
166,000,000
27.31
3
5
8
10
Self-created Cantonese
377,400,000
28.49
3
5
7
9
Self-created Passphrase
95 13
85.41
1
2
3
3
46
4.2.10 Example to Create CLPW and CLPP
This section shows an example on how self- created signature-like Han
character is encoded to create big and yet memorizable secret. For the word
etymology of "Chin" and "Han", they are originated from the names of two early
dynasties called Qin (秦) and Han (漢) in China. Even though there are many
rounds of renaming in Chinese language for the country of China, its English name
remains unchanged till today in carrying the phoneme of "Qin" for "Chin". Therefore,
Chinese character is also called Han character (漢子 or 汉子) . The repertoire size
of Han characters is 85,568 in the dictionary of Zhonghua Zihai (Word Dictionary of
Chinese Language) published in 1994. Han characters are used in CJKV languages,
in which it is called Hanzi in the Chinese language, Kanji in the Japanese language,
Hanja in the Korean language, and Han Tu in the Vietnamese language.
It is to note that the entropy of Han characters is higher than the ASCII
characters. Due to the logographic type of language, Han characters carry visual
meaning and hence are easily memorizable. In other words, Han characters have the
intrinsic features of high entropy and good memorizability, which mean their
suitability for the creation of big and yet memorizable secret. Nevertheless, Han
characters have input problem. The number of Han characters is too many to be
represented by a single keyboard. Another problem is that direct application of Han
characters as password the secret is vulnerable to guessing attack, dictionary attack,
and pre-computation attack.
To solve the first problem, a Han character can be encoded using its character
structure (or symbolic shape) and/or phonetic pronunciation based on ASCII
characters. This process is called Romanization. For example, when pronunciation
system of Hanyu Pinyin (汉 语拼 首ノ and character structure system of Sijiao
Haoma (or four-corner method) ( 四角 号石马 ) are used to encode and Romanize the
Han character of {han} (、汉 ) in simplified form, the code is {han4} from Hanyu
Pinyin and {37140} from Sijiao Haoma, forming one of many possible codes like
{han437140} called CLPW (Chinese Language Password). However, the second
47
problem of vulnerability to guessing attack, dictionary attack, and pre-computation
attack, has not yet been solved.
To solve the second problem, the randomness of the CLPW using Han
character has to be increased. A Han character from any encoding like Unicode
encoding can be modified to become a self-created signature-like Han character new
to the current available repertoire of Han characters. Phonetic pronunciation system
and character structure system using ASCII characters can be used to encode and
Romanize the self- created signature-like Han character into a CLPW that can resist
the guessing attack and dictionary attack.
200
201
Figure 4.3 Example of self-created signature-like Han character from {han} (汉)
Figure 4.3 illustrates an example of self- created signature-like Han character
by modifying the Han character of {han} (汉) in Box 200 of Figure 4.3 (left) from
{hanyu pinyin = han4} and {sijiao haoma = 37140} to Box 201 of Figure 4.3 (right)
{hanyu pinyin = han4} and {sijiao haoma = 37141}. In other words, the CLPW has
been modified from {han437140} to {han437141}. The adoption of self-created
signature-like Han character shares the similar habit with Chinese people to use a
general name aliasing with another rare name. A name using frequently used Chinese
characters allows easier memorizability and pronunciation, but harder differentiation
due to name clashing. A second alias name using rarely used Chinese characters
helps to make a person's name unique and differentiable from the others, but carries
a problem of harder pronunciation. Hence, pronounceable name is for easy calling
and unique name is for easy differentiation.
48
Self-created signature-like Han characters enlarge the key space of CLPW to
4,150,000. When tone mark and Fuhao (附 号) are included, it becomes
207,500,000 or entropy of 27.63 bits per Han character. The efficiency of CLPW is
hence greatly increased. To further increase the randomness, a Chinese language
password (CLPW) can be upgraded to a Chinese language passphrase (CLPP) by
adding textual semantic noises like character stuffing, capitalization, permutation,
punctuation marks, misspelling, mnemonic substitution, and/or alternative symbols
from ASCII mutual substitution table. One unit of CLPW can be set to a fixed length
like 13 ASCII characters or other size, and a few units of CLPW form a unit of CLPP.
For a unit of CLPW, its 13 ASCII characters are formed from phonetic syllable of
length 6, tone mark of length 1, Syiao Haoma with Fuhao of length 5, and non-
alphanumeric character as a separator of length 1.
Character stuffing is like bit stuffing in data communication to enable the
syllable length at a fixed value of 6. It is 6 because the maximum syllable length is 6
in Hanyu Pinyin, by excluding the tone mark. Of course, other phonetic
pronunciation systems, especially Chinese dialects and CJKV languages, like
jyutping for Cantonese language and romaji for Japanese language, can be used as
well. Similarly, other encodings of Han characters could be used. For the example of
13-character CLPW with textual semantic noises using the Han character of {han}
(汉) , it can be in the forms of {h@n4*** & 37140}, {37140&HaN4***}, and so
on. When the textual semantic noises are good enough from prediction, the ideal
entropy of fully random absolute rate at entropy of 85.41 bits per unit of CLPW (or
unit of Han character with modification and added noises) can be approached.
A few serial units of CLPW form a CLPP that has good memorizability,
resistance to guessing attack and dictionary attack, as well as suitability for general
usages. CLPP of size beyond 128 bits can realize the AES-128, AES-192, AES-256,
DSA-256, ECC-256, and so on. When CLPP is used for MePKC operating on the
platforms of FFC and ECC, even the pre-computation attack can be avoided. Table
3.3 shows the numbers of CLPP units for various key sizes. People knowing Han
characters can memorize a CLPP with 2 to 4 units of CLPW as easy as remembering
a person's name using rarely used Han characters.
49
Nevertheless, the current prior art of single-line key/password input neld is
not that friendly when there are two or more CLPW. There exists a user interface
problem to input password with long key size in a single line. This problem happens
also to other passphrases having a lot of characters. Whenever there is a pause or
interrupt during the input process of a passphrase, it is hard to determine the starting
points of every word or unit of a passphrase. In other words, a long passphrase like
three to four units of CLPP has to be entered instantly without an interrupt or error.
Any uncertainty in keying in a passphrase to a single-line key field requires the
whole re-keying process of that passphrase.
4.3 Two-Dimensional (2D) Key
Conventionally, single-line key field is used to input a key. The selection of a
key depends on the factors of memorizability and security. The minimum key sizes
for symmetric and asymmetric key crypto systems are 80 and 160 bits, respectively.
For symmetric key crypto system, National Institute of Standards and
Technology (NIST) of USA proposed security level of 80-bit key to be phased out by
year 2015 and used until year 2010 (E. Barker, W. Barker, Burr, Polk, & Smid,
2007a, 2007b). US government has an export policy to control the power of
cryptographic algorithm by setting the maximum key size. The current export limit
of symmetric key size has been raised from 40 bits to 128 bits.
For the symmetric key crypto system of Advanced Encryption Standard
(AES), there are three key sizes: 128, 192, and 256 bits. The asymmetric key
crypto systems, which demand for the minimum private key size at 160 bits by year
2010, are unite field cryptography (FFC) and elliptic curve cryptography (ECC).
FFC and ECC are based on the mathematical hard problems of discrete logarithm
problem and elliptic curve discrete logarithm problem, respectively. The
corresponding sizes of private keys to the AES are 256, 384, and 512 bits,
respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b; Gehrmann &
Naslund, 2005, 2006, 2007). The symmetric key is normally remembered by brain;
whereas the asymmetric private key is encrypted using another symmetric key.
50
ASCII characters have entropy of 6.57 bits per character. Therefore, the
nominal bit of an ASCII character is 8 bits, but its effective bit is 6.57 bits. To cater
for the different symmetric key sizes at 80, 96, 112, 128, 192, and 256 bits as in
Table 3.3, 13, 15, 18, 20, 30, and 39 ASCII characters are needed, respectively. An
amount of 15 ASCII characters is perhaps still affordable and convenient for the
human users. However, higher amounts may introduce two problems.
Memorizability is the main problem. The difficulty to type a long passphrase into a
computer will be another open problem (Schneier, 1996).
Here, a high-entropy key input method called 2-dimensional (2D) key as in
Figure 4.4 is proposed to solve these problems. 2D key facilitates particularly the
recognition of reference points of each sub-unit of a passphrase like CLPW of CLPP,
and generally the creation of various secret styles of 2D key like multiline passphrase,
crossword, ASCII graphic s/art, Unicode graphic s/art, colorful text, sensitive input
sequence, and two or more of their hybrid combinations as partially illustrated in
Figures 4.6-4.9, for Latin language users.
It uses a 2D display as user interface to improve the human factors of
memorizability and input of ASCII characters from keyboard. The 2D key has the
styles of multiline passphrase, crossword, ASCII art, colorful text, or sensitive input
sequence. It can resist dictionary attack and fulfil the demands of human-
memorizable key sizes even until 256 bits, which is impossible by using the single-
line passphrase. CLPW and CLPP may also be used in the 2D key.
In addition to fulfilling the various key sizes of symmetric key crypto system,
2D key has novel revolution to the private key storage of asymmetric key
crypto system. For the prior arts, we have encrypted private key, split private key, and
roaming private key. With the introduction of 2D key, there shall be no more need to
store the private key in a computing system, but inside the brain as like the
symmetric key. This allows the creation of memorizable public-key crypto system
(MePKC) as discussed in Chapter 9. MePKC has the special features of mobility,
lower cost, and higher efficiency.
51
400
V
Optionally activate the anti-keylogging software.
、
f
Open the 2D key application software for its input interface:
(1) Select row and column sizes
(2) Select to view or hide the secret to be entered
、
f
401
/X7I
402
User enters a secret into the 2D field using one or a combination
of the secret styles as follows:
(1) Multiline passphrase
(2) Crossword
(3) ASCII graphics/art
(4) Unicode graphics/art
(5) Colorful text
(6) Sensitive input sequence
(7) Other hybrid combinations
/X7I
403
Further secret processing over the password using the optional
techniques as follows in sequential order or not in order:
(1) Key hashing
(2) Key strengthening
(3) Multihash key
(4) Other secret processing techniques over the password like
generating multiple slave keys from a master key
、
f
Apply the finally generated secret(s) for various applications.
、
f
Clear the memory storing the initial, intermediate, and final
secrets. Then, close all the application software.
ᄉ \71
404
ᄉ X71
405
406
Figure 4.4 Operation of 2D key input method and system
52
4.3.1 Related Work: Single-Line Key/Password Field
Conventionally, whenever secret is used as the authentication method, single-
line key field will be the area for a user to enter a key. For the current longest
possible key, it is a single-line passphrase. For passphrase, it can be formed from
acronym, sentence, diceware, and coinware. Nevertheless, there is a limit due to the
problems of memorizability and ASCII character input from keyboard. The first
problem is due to the human factor; whereas the second is due to the user interface.
These problems prohibit the applications of symmetric key sizes at higher security
levels whenever a user cannot remember and/or conveniently enter a long single-line
passphrase.
4.3.2 Related Work: Key Strengthening
Key strengthening is also called key stretching. It is used to make a weak key
stronger. There are two forms of key strengthening. One uses password supplement
(Manber 1996; Abadi, Lomas & Needham, 1997; Abadi, Needham & Lomas, 2000),
and another uses many rounds of hasn iterations (Kelsey, Schneier, Hall & Wagner,
1997). In this thesis, key strengthening is applied to achieve larger protection periods
for symmetric and asymmetric crypto systems like AES and MePKC.
S = n*L*R/P (4.1)
S = Key space
n = Number of networked computers
L = Maximum lifetime of a key in years
R = Number of guesses per unit of time per unit of computer
P = Probability that a key can be guessed in its lifetime
Typical values:
n= 10 9 units = 29.9 bits
53
L = 4, 10, 20, 30, 300 years = 2, 28.2, 29.2, 29.8, 33.1 bits
R = 1.5 X 10 7 s— 1 = 23.8 bits (best performance in year 2005)
R = 1 s _1 = bit (using key strengthening)
P= 10— 6 = -19.9 bits
Equation (4.1) is a password length equation. When key strengthening is used,
R becomes 1 guess per second and the variety of computer is a main factor to set the
number of hash iterations. The computer performance of a variety of computers
varies from 1 time for the slowest computer to 20 times for the fastest computer. This
contributes a factor of log220 = 4.3 bits to Equation (4.1). Moore's Law states that
the number of transistors on an integrated circuit for minimum component cost
doubles every 24 months (Wikipedia Contributors, 2008v).
S = (n*L*R/P)* 2 43 * 2 L/2 (4.2)
When the variety of computers and Moore's Law are considered, it becomes
Equation (4.2). From Equation (2), key strengthening can make a weak key to
become 19.5 bits stronger.
4.3.3 2D Key Input Method
For single-line passphrase, the numbers of ASCII characters for different
symmetric key sizes are shown in Table 3.3. An amount of 15 ASCII characters or
96 bits is a memorizabilty limit for many human users. This fact is statistically
proven by Florencio and Herley (2007) in their large-scale study of web password
habits for half a million users over a 3-month period, where the average key size is
40.54 bits ranging from exclusive to inclusive 100 bits or ]0, 100]. The difficulty of
user interface to enter a key using keyboard into the single-line key field is another
big problem.
54
The problems of human factor and user interface limit the practical
application of symmetric key crypto system to be at the key size of 96 bits with 10
years of protection. Using key strengthening, the 96-bit key can be made 19.5 bits
stronger, and 20-year protection is the maximum theoretical limit.
The 2-dimensional (2D) key input method is created to allow high-entropy
keys. Figure 4.5 displays the pseudocode of 2D key input method. It tries to solve the
human factor of memorizability and user interface of key input. 2D key has a 2-
dimensional display alike a 2D matrix, where each character of a key is an element
of the matrix.
1.0 User selects row size.
2.0 User selects column size.
3.0 User enters ASCII characters or Unicode symbols one by one.
4.0 User ends the key input by pressing the "Enter" key.
5.0 Computer hashes the input key.
6.0 Computer compares the hashed key with the stored hash.
6.1 If the hashes match, authentication is verified.
6.2 If the hashes mismatch, authentication is rejected.
Figure 4.5 Pseudocode of 2D key input method and system
The font used for 2D key has to be fixed-width font (Wikipedia Contributors,
2007f). Fixed-width font is also called non-proportional font and monospaced font. It
is a typeface using fixed width for every glyph. Examples of fixed-width fonts are
Courier for ASCII and MS Mincho for Unicode. When ASCII encoding is used, the
2D key has 6.57 bits per character. Meanwhile, when Unicode is used, it has 16 bits
per character. Even though Unicode-based 2D key has higher entropy, it is
inconvenient to enter a Unicode symbol for the mean time, and the fixed-width font
for all the Unicode symbols has not yet been created. Hence, ASCII-based fixed-
width font is used currently for the discussions as well as prototype demonstration.
To use 2D key input method and system, firstly a user needs to select the row
size and column size of the 2D matrix for 2D key. The currently built prototype has a
maximum row size or height of 10 characters, and a maximum column size or width
55
of 13 characters. The column size is set at 13 due to the Chinese-character-encoded
passphrase proposed in Section 4.2 has a maximum size of 13 per Chinese character.
Alternatively, it can be a word in English language or other languages that has a size
of 13 characters per word with character stuffing.
The input styles of 2D key are multiline passphrase, crossword, ASCII art,
Unicode art, colorful text, and sensitive input sequence. Multiline passphrase,
crossword, and ASCII art are currently implemented in the prototype; whereas
Unicode art, colorful text, and sensitive input sequence require additional supports.
After selecting the row size and column size, the user can input ASCII
characters using keyboard as the elements of the 2D matrix. The input characters can
have any style or a mixed style of 2D key. These styles have good memorizabilty,
and the 2D nature of 2D key generates more references at the user interface for key
input. Single-line key field has only one reference at the first location of the only line.
2D key has a number of horizontal lines and each first location of the horizontal lines
acts as references for key input. In addition, the first locations of the vertical lines
can be secondary set of references for key input. This solves the location recognition
problem of user interface in facilitating a user to enter a high-entropy key by having
more indexed references.
Good memorizability allows a user to repeat a high-entropy key. The
elements of 2D matrix can be either partially, fully, or extraordinary filled. To fill
extraordinarily means adding some extra trailing characters as noise after the last
element of the 2D matrix. The characters entered into the 2D key field are read by a
computer line by line horizontally from top to bottom, hashed, and processed as
usual alike the single-line key field. The hashing process is one round if key
strengthening is not used. If key strengthening is used, the hashing iteration is set
according to the computer response time per access ranging from 0.05 to 1 second, or
any other tolerable ranges.
The advantages of 2D key are good memorizability, high-entropy key, more
references at the user interface to facilitate key input, and resistance to dictionary
attack. Even pre-computation attack can be avoided if the 2D secret is used on the
platform of MePKC. Its disadvantages are more time for key input and possible
56
shoulder- surfing attack. Nevertheless, for a long passphrase having many individual
units like word, the key input time of 2D key is faster than the single-line key field
whenever there is some interrupt and the user has forgotten the input sequence. This
is because only that particular sub-unit has to be re-keyed in and not the whole secret,
such like the secret style of multiline passphrase.
4.3.4 Styles of 2D Key: Multiline Passphrase
For single-line key field, it is hard to input a high-entropy single-line
passphrase due to the problem of user interface. A user may lose the reference of
starting character of a word in a passphrase. Using 2D key, multiline passphrase can
be input, where each line consists of one word of a passphrase. Each word is padded
to the longest word in the passphrase. The padding character can be any ASCII
character and acts as a text-based semantic noise. Figure 4.6 shows a 2D key
example using multiline passphrase. Its dimensions are 4x5, and uses character
as the padding character. This 2D key has entropy of 131 bits.
Have^
7t 7t 7t
happy
day ! *
Figure 4.6 Styles of 2D key: Multiline passphrase
HAPPY ᅮ
M^INCH
SPELLS
Figure 4.7 Styles of 2D key: Crossword
4.3.5 Styles of 2D Key: Crossword
The second style of 2D key is crossword. Instead of horizontal and vertical
multiline passphrase, a user can enter a mixture of horizontal, vertical, and slanted
57
passphrases. Figure 4.7 shows two 2D key examples using crossword. Their
dimensions are 5 x 6 (left) and 5x7 (right), and use characters and ':,,
respectively, as the background character. These 2D key have entropy of 197 and
229 bits, respectively.
4.3.6 Styles of 2D Key: ASCII Art / Unicode Art
The third style of 2D key is ASCII art or Unicode art. ASCII art is a graphical
presentation of computer using the 95 printable ASCII characters (Wikipedia
Contributors, 2007g). Unicode is a variant of ASCII art, where instead of using
ASCII characters, Unicode symbols are used to create artistic graphics.
111111
111111
— — 11 — —
— 11 —
— 11 —
111111
111111
Figure 4.8 Styles of 2D key: ASCII art
Figure 4.8 displays three 2D key examples using ASCII art. For the left
example, ASCII characters 'V and are used to display a Chinese character
meaning "engineering". Its dimensions are 7x6 with entropy of 275 bits. For the
middle example, ASCII characters '2' and 'D' are used to display a digit '10' with
background character '2,. Its dimensions are 5x6 with entropy of 197 bits. For the
right example, ASCII characters T and are used to display a Chinese character
meaning "center" with background character Its dimensions are 5x6 with
entropy of 197 bits.
Figure 4.9 shows a 2D key example using Unicode art. Unicode symbols
and are used to display a Chinese character meaning "engineering" again.
Unicode '¥' is entered using the keyboard by pressing the keys "0165" while holding
the key of 'Alt'. Unicode is entered using the keyboard by pressing the keys
222222
2D2DDD
2D2D2D
2D2D2D
2D2DDD
* * * * I
58
"0169" while holding the key of 'Alt'. Once the 'Alt' key is released, the Unicode
symbol is entered. Its dimensions are 4x5. This 2D key has entropy of 320 bits.
¥¥¥¥¥
©©¥©©
©©¥©©
¥¥¥¥¥
Figure 4.9 Styles of 2D key: Unicode art
4.3.7 Styles of 2D Key: Colourful Text
The style of this 2D key needs some additional supports. Color encoding,
special graphical user interface, and special computer processing are required.
Although these supports make the user interface complicated for the computer, they
can be implemented and have better memorizability for the human users. Color is
definitely a main element of good memorizability. For example, by having 16 types
of colors, every character in the 2D key will have an additional 4 bits. ASCII-based
2D key will become 10.57 bits per character; whereas Unicode-based 2D key is
20.59 bits per character. The entropies per character of ASCII-based and Unicode-
based 2D keys will be increased by 60.9% and 24.1%, respectively. The additional
color secret also carries more randomness to resist dictionary attack.
4.3.8 Styles of 2D Key: Sensitive Input Sequence
For the secret style of sensitive input sequence, it is an additional feature over
the current 2D secret style where there is added entropy from the input sequence of a
character to a specific element location of the 2D matrix. If a 2D key has the
dimensions of m x n, the key space is increased by [(m * n)l]. If a 2D key of 4 x 5 as
in Figure 4.4 is used, the key space is increased by [20!] or 61.1 bits from 131.40 bits
to 192.47 bits, which is close to the left example in Figure 4.5 for the 2D key of
dimensions 5x6 with 197.10 bits.
This style requires the space encoding for the element location of 2D matrix,
table- like graphical user interface of m x n matrix, and human memory for the
59
sequence of characters. In term of memorizability, there is not much improvement.
However, the time to enter a 2D key of similar size is greatly reduced for the same
amount of entropy.
4.3.9 Applications for Symmetric and Asymmetric Key Cryptosystems
With the emergence of 2D key having the styles of mutliline passphrase,
crossword, ASCII art / Unicode art, colorful text, and sensitive input sequence, high-
entropy key as high as 256 bits is possible. Chinese-character-encoded passphrase
can be efficiently used for the 2D key style of multiline passphrase. We can now
overcome the human factor of memorizability and user interface problem of single-
line key field, which have limited the key size to 96 bits.
Table 4.16 shows the possible dimensions of ASCII-based 2D key for various
key sizes of symmetric key crypto system. Key strengthening can boost up another
19.5 bits. If Unicode-based 2D key is used, the dimensions of 2D key can be greatly
reduced. From Table 3.3, the settings sufficiency of some key input methods and
systems for various key sizes is shown. It can be observed that larger key sizes than
128 bits for cryptographic, information-hiding, and non-cryptographic applications
like AES-128, AES-192, AES-256, ECC-256, etc., can be realized by using the 2D
key, especially the MePKC using fully memorizable private key.
Table 4.16 Dimensions of 2D key for various symmetric key sizes
Symmetric key size (bits)
80
96
112
128
192
256
Number of ASCII characters
13
15
18
20
30
39
Dimensions of 2D key
3x5
3x5
3x6
4x5
5x6
5x8
For asymmetric key crypto system, memorizable public-key crypto system
(MePKC) can be created. This is possible by using the FFC and ECC with minimum
size of private key at 160 bits. The private key of MePKC is stored in the human
brain, and not stored as encrypted, split, and roaming private keys as in the prior arts.
This provides mobility, lower cost, higher efficiency, and resistance to dictionary and
pre-computation attacks.
60
Assuming that the maximum memorizable key size is 256 bits, 256-bit
MePKC using FFC and ECC with 128-bit security strength can be realized. It has a
protection period of 30 years. If key strengthening is used, 19.5 bits is added, or an
increase of 10-bit security, which extends the protection to 50 years. This is very
much enough for many practical applications. For more information, please refer to
Chapter 9.
A software prototype of this 2D key (Lee, 2006b, 2008i) with the function of
multihash key (Lee, 2007a) has been built up by using the Microsoft Visual Studio
(Marshall, 2003). The 2D key can have optional anti-keylogging application software
(Log This, No date; McNamara, 2003, pp. 197-202) to achieve higher security during
the input. To get a copy of this software, please visit [URL: www.xpreeli.com].
There are other potential applications of 2D key methods and systems. Firstly,
2D key can be specialized to include only numeric digits or other sets of limited
encoded characters for devices with limited space like the display and key pad of a
bank ATM machine and computerized safety box. Secondly, the display of 2D key
can be an LCD display or other display technologies integrated with a computer
keyboard having a first partial 2D key optionally visible and a second partial ID key
in hidden mode only to better resist the shoulder- surfing attacks.
4.3.10 Conclusion
Here, the high-entropy 2D key input method has been proposed. It solves the
memorizability problem due to human factor and user interface problem of single-
line key/password field. Chinese-character-encoded passphrase is efficient for the 2D
key style of multiline passphrase. Besides, 2D key has the styles of crossword,
ASCII art, Unicode art, colourful text, and sensitive input sequence. The
memorizable limit of 96-bit key is increased to 256-bit key, where even the private
key is memorizable. This creates 160-bit to 256-bit MePKC with protection period
up to 50 years.
61
CHAPTER 5 CREATING BIG MEMORIZABLE SECRET
(PART 3)
5.1 Multilingual Key
2D key is a method suitable for Latin language users. For users of CJK
languages using the Han character and other non-Latin languages, multilingual key is
an alternative to 2D key. For the trends, statistics, and geo-political coverages of
monolingual, bilingual, and multilingual language users, please refer to Section 4.1.5.
5.1.1 Related Works
For the related works of multilingual key, please refer to Section 3.4 on
potential methods to create big and yet memorizable secret. These related works are
graphical password, Passfaces, Draw-a-Secret scheme, icon-like graphical password
scheme, and event-based graphical password scheme.
5.1.2 Black-and-White Multilingual Key
For multilingual key, graphical password/key method and system is somehow
innovated to have both the features of cognometrics and locimetrics by using graphic
symbols of multilingual languages from any symbol encoding code, such as Unicode,
specifically. This invention is especially effective for logographic, bilingual, and
multilingual language users. In this new secret creation method, there is a huge key
space comprising black-and-white and/or colorful Unicode graphic symbols grouped
into tabular pages as in Figure 5.1 illustrating one of the exemplary tabular pages
{4E00-4EFF}.
For this black-and-white multilingual key, a user knowing a particular
language has the property of cognometrics to recognize a graphic symbol.
Furthermore, there exists also the property of locimetrics for a user to locate a tabular
page, subsequently a graphic symbol, and finally a partitioned area of a Unicode
graphic symbol.
62
500
4E
o
1
2
3
4
6
7
8
9
ノ
A
B
c
D
E
F
丐
丰
乐
习
买
ノ 、
亀
京
ノ j 、
什
1 1
牛
仔
1
丁
-*
丑
両
\
、
舌し
1 ― 1 ᄂ i
乾
丁"
亡
{H
1 •■
仁
ィ乞
ィ今
2
丢
串
1
乂
丘
亂
互
7 ᄂ
ノ u
쟈 T.
ノ 1、
仿
しん J
令
、
fg
仲
1 1
3
七
专
ノ 1
弊
ノ J
乃
丘
ᄀᄂ i
乳
-J ᄂ i
舞 ᄂ
/T ᄂ i
fr
ノ 1
7T
ノ j
毫
1 ~i
仓
代
1 Ni
4
丄
且
两
1 ~}
临
1 M-4
メ
豊 ᄂ
五
父
JX
!ノ V
仔
1 -J
f 月
5
조
严
半
1
ズ
辛し
-J
井
ノ 1
褒
"도 ᄂ、
仅
し/ V
仕
1_ᄂ
以
""ノ 、
仔
1 1
6
世
1 ——
並
、
9、
5i 匕
书
■ ~ノ
r L
了
亦
直
仆
1 1
他
f 小
1 -J
件
1 1
7
万
f 什
1— H
丧
レ、
、 /
튄
乗
ノ 1 、
C i
' L
产
廉
IA 1、
仇
仗
价
1 ノ 1
8
丈
ノ^^
丘
丸
ノ 1— i
乘
^ 1 、
台 ᄂ
1 ~ 1 ᄂ i
碰
予
豆
t __ >
|$
つ 1
付
1 ᄀ J
伏
\y 、
9
丙
1\
1
丹
乙
占 ᄂ
1 ᅳ 1 u
草 ᄂ
ᅳ
争
瓦
亩
1 ■ 1
仙
让
伴
1 1
A
上
业
个
— -
、 /
ᄂ
m
事
亚
N.
人
y 、
I
1^
1 1 1
合
B
下
丛
丫
1
主
— y
カロ
事
ifcb
i
I
介
ノ 1
1 1— i
任
1 ~ ᄂ
C
ᅲ
东
井
乌
"a
亜
京
fx
任
D
丝
中
乍
九
右
ムみ
个
仍
fit
份
E
丞
举
乞
乾
亞
[A
m
仮
但
F
丐
丢
丰
J
乏
也
s ᄂ
亿
仏
if
抄
仿
Figure 0.1 une of the exemplary tabular pages of multilingual kev consisting of tne
first 256 Han characters in the Unicode and starting from Unicode value {4E00}
63
The input method of multilingual key is normally a computer mouse, where it
can also be other input devices like touch screen, tablet, stylus, keyboard, sound
recognition, eye-tracking technology, Microsoft Surface, etc. The monitor tend
towards wide- screen LCD at lower cost shall popularize the multilingual key.
5.1.3 Grid Partitioning for Higher Entropy and Randomness
To increase the entropy per image selection and its randomness to resist
guessing attack and dictionary attack, invisible grid partitioning is applied to every
graphic symbol based on the setting of 3 ^ 3, particularly, or any other settings such
as 2 ^ 2, 4 ^ 4, and so on, as in Figure 5.2.
Figure 5.2a Figure 5.2b
Figure 5.2c Figure 5. 2d
Figure 5.2 A Han character from Unicode before and after the grid partitioning for
various settings: (Figure 5.2a) Without grid partitioning; (Figure 5.2b) with grid
partitioning of 2 ^ 2; (Figure 5.2c) with grid partitioning of 3 ^ 3; and (Figure 5. 2d)
with grid partitioning of 4 * 4
3
o
64
These partitioned areas increases the entropy of multilingual key by 2, 3, and
4 bits, respectively, for 2 * 2, 3 * 3, and 4*4 settings. Every partitioned area
represents the concatenation of a few bits to the bitstream encoding a graphic symbol
using Unicode in a tabular page consisting of 256 symbols or flexibly any other
amount. Among the settings of grid partitioning, 3 * 3 is selected as the optimum
settings and used for further explanation.
1
2
3
blank
4
6
7
702
8
9
10
11
blank
12
13
14
15
ᄉ X7I
703
Figure 5.3c
Figure 5.3d
Figure 5.3 und partitioning encoding of a graphic symbol, wherein (Figure 5.3a)
illustrates the 3*3 settings where red lines are invisible; (Figure 5.3b) illustrates the
encoding for human memorization and reference in the human context; (Figure 5.3c)
BMP (Basic Multilingual Plane) when a partitioned area is selected in the computer
context; and (Figure 3.jd) illustrates the concatenated bit values to the Unicode value
of a graphic symbol in the SIP (Supplementary Ideographic Plane) when a
partitioned area is selected in the computer context
65
There are nine partitioned areas in the setting of 3 * 3 as in Figure 5.3a. The
outer 8 partitioned areas are encoded by 3 bits. Meanwhile, the central partitioned
area adds no bit. For Han characters and other multilingual languages, two Unicode
planes are used in the multilingual key, where more Unicode planes can also be
added. These are BMP (Basic Multilingual Plane) and SIP (Supplementary
Ideographic Plane), where both can support 65536 (= 216) graphic symbols.
For computer context, graphic symbols from different Unicode planes are
encoded by bit for BMP and bit 1 for SIP; whereas the 9 partitioned areas have the
central area to carry blank value, and the outer areas to represent bit values of 0, 1, 2,
to 7 for BMP and 8, 9, 10, to 15 for SIP, as in Figures 5.3c and 5.3d, respectively.
For human context, to ease memorization and references, the 3*3 partitioned areas
are again encoded by digits from 0, 1, 2, to 9 as in Figure 5.3b. The central area
represents digits and 5; whereas the outer areas represent 1, 2, 3, 4, 6, 7, 8, and 9
for both graphic symbols from BMP and SIP. Hence, the 3 x 3 grid partitioning adds
either bit with one-fifth (1/5) probability, or 4 bits with four-fifth (4/5) probability,
to the Unicode value of a selected graphic symbol.
For instance, for a Chinese language secret of [秦 漢] (Qin Han), the code of
multilingual key without grid partitioning is {79E66F22}i 6 based on Unicode, where
{79E6}i6 represents [秦] (Qin) and {6F22} 16 represents [漢] (Han). When 3 * 3 grid
partitioning is used, two more digits of secret are added. Let the first digit to be {4}i
to represent the western piece of partitioned areas of [秦] (Qin), and the second digit
to be {5} io to represent the central piece of partitioned areas of [漢] (Han).
Consequently, the constructed secret is [秦 4 漢 5] (Qin 4, Han 5).
Since both the Han characters of [秦 漢] (Qin Han) are in the BMP, then the
encoded secret for a computing device is {79E636F22}i6. The concatenated
hexadecimal digit of {3}i6 to the end of the Unicode value of {79E6}i6 is constructed
from {001 1 )2 where the first bit represents the BMP and the last three bits represent
the western piece of partitioned areas. For the numeric secret of {5}io, no
hexadecimal digit is added because digits {0}io and {5}io represent no concatenated
66
value to the Unicode value of selected graphic symbol. The concatenation of these
numeric secrets representing different partitioned areas can be at any location of the
Unicode values of the selected graphic symbols.
Therefore, for black-and-white multilingual key with 3*3 grid partitioning, a
selected image by clicking a partitioned area carries 16.59 or 20.59 bits, with
probabilities of 1/5 and 4/5, respectively. For a sequence of many selected
partitioned image areas, the average entropy per image selection for this type of
multilingual key is 19.79 bits.
5.1.4 Colourful Multilingual Key
To further increase the key space for higher entropy, colourful multilingual
key is an added option. The (16+l)-colour scheme of colourful multilingual key as in
Figure 5.4 is selected for explanation, where it can also be other settings. The (2+1)-,
(4+1)-, (8+1)-, and (16+l)-colour schemes of colourful multilingual key additionally
add 2, 4, 6, and 8 bits, respectively, to the black-and-white multilingual key with 3 *
3 grid partitioning. This means that a selected partitioned image area of (16+1)-
colour multilingual key has 24.59 or 28.59 bits and average entropy of 27.79 bits.
Also, besides Unicode character and partitioning digit, a user needs to remember a
third secret for the combination of foreground and background colours.
Yet to further increase the key space, some special text processing techniques
can be used, wherein examples include special effects like directional shadow, 3D
styles, and lighting; enclosed character using shapes like circle, square, triangular, or
diamond; typeface variation like font type, font size, as well as font format of single
strike through, double strike through, and underscore/underline; mirror images on the
left, right, up/down; 45°-, 90°-, and 135°-degree clockwise and anti-clockwise rotated
images; solid and hollow images; and background watermark.
5.1.5 Font Technologies to Solve Data Size Problem
Nevertheless, the potential huge key space of colourful multilingual key with
and without special text processing techniques has memory storage problem due to
67
its huge image size if tabular pages of graphic symbols are stored in normal image
file format like BMP, GIF, JPG, and PNG. For black-and-white multilingual key, its
problem is not the image storage, but the image loading to the limited RAM, which is
also a second problem to the colourful multilingual key.
800
p
f
星
星
星
星
e
星
星
星
星
星
n
d
星
星
星
星
r — »
m
c
星
星
星
星
1
b
星
星
星
星
k
a
星
星
星
星
星
J
9
星
星
星
星
星
星
も
星
星
星
星
星 星
ᄂ
n
7
星
星
星
星
g
6
星
星
星
星
星
星
星
星
星
星
星
星
星
星
星
f
5
星
星
星
星
e
4
星
星
星
星
d
3
星
星
星
星
c
m
星
星
n
星
星
星
星
星
b
星
m
星
星
星
星
星
a
星
星
星
星
星
星
星
星
星
星
星
星
星
星
1
2
3
4
5
6
7
8
9
a
b
C
d
e
f
a
b
c
d
e
f
g
h
j
k
1
m
n
p
Using XI i Color names or any other color encoding:
Black #000000 Brown #A52A2A Red #FF0000
Yellow #FFFF00 Green #008000 Blue #0000FF
Gray #808080 White #FFFFFF Silver #C0C0C0
Salmon #FA8072 Gold #FFD700 Khaki #F0E68C
Pink #FFC0CB
Orange #FFA500
Violet #EE82EE
Tan #D2B48C
Cyan #00FFFF
N.B. (Nota Bene): The first 10 encoded colours from to 9 are according to the resistor colour
code. Other extended digits from 10 to 15 are the lighter colours from black to green, respectively
modulus 10, and the last colour pink is used as the front-slash- wise diagonal background colour.
Figure 5.4 ᄂ lb+l)-colour scheme for colourful multilingual key
68
To solve the limited RAM problem of black-and-white and colourful
multilingual keys, the image file format of PNG (Portable Network Graphics), which
is good for image compression of line art, can be used for efficient size of image
database. Yet for better file compression, algorithm of DJVU file format can be
further applied by splitting a tabular page into many layers for separate compression.
However, the best current possible and practical solution to both the problems is to
have real-time font rasterization from font files like outline font or vector font storing
all the Unicode graphic symbols to the monitor display.
5.1.6 Resistance Techniques to Shoulder-Surfing Attack
Another problem of multilingual key is shoulder- surfing attack from a person
or camera nearby the monitor and able to watch and record the image area selection
of sequential Unicode graphic symbols. The first solution relies on the human
memorizability limit and asks a user to do false selection of image areas by toggling
a key on the keyboard, or single-double or left-middle-right clicking of mouse. The
second solution is to allow a user to enter a textual password into a key field at any
interim session during the input of a graphical key. In other words, the second
solution is a hybrid method combining the textual and graphical passwords/keys.
5.1.7 Fast Search for a Unicode Graphic Symbol
Yet another problem of multilingual key is its huge key space causes the
search of a graphic symbol to be slow if only images of Unicode graphic symbols are
stored. To solve this problem, there can be some tabular pages specially designed to
list and show the frequently used Unicode graphic symbols, especially Latin and Han
characters, or Latin and other languages, to speed up the image area selection of a
Unicode graphic symbol. A second solution is to have a fast input method and
system of Unicode graphic symbol to search and locate the tabular page and specific
location of a particular graphic symbol, which is now possible for Latin languages
and CJKV languages using Han characters.
69
900
V
Optionally activate the anti-keylogging software.
、
Open the multilingual key application software for its input
interface.
、
f
ᄉ X7I
901
902
User enters a secret of multilingual key:
(1) Search for the specific tabular page containing the Unicode
graphic symbol
(2) Real-time font rasterization displays the specific tabular page
containing the Unicode graphic symbol
(3) User optionally clicks on a selected Unicode graphic symbol
to access the (16+l)-color scheme
(4) User clicks on the partitioned area based on digit secret and
optional color secret
(5) User optionally cancels for false signal to resist shoulder-
surfing attack or confirms on the selected secret of Unicode
graphic symbol together with its secrets of digit and color
(6) Repeat steps (1) to (6) of Box 903 in sequential order until
sufficient key entropy has been achieved
/ATI
903
、
User optionally enters another textual password/key into a
password/key space to resist shoulder-surfing attack.
f
Undergo secret processing technique(s) as in Box 404. Then,
apply the finally generated secret(s) for various applications.
/
Clear the memory storing the initial, intermediate, and final
secrets. Then, close all the application software.
904
905
906
Figure 5.5 Operation of multilingual key input method and system
70
5.1.8 Applications for Symmetric and Asymmetric Key Cryptosystems
Subsequently, big memorizable secret for cryptographic, information-hiding,
and non-cryptographic applications in information engineering can be created from
multilingual key as in Figure 5.5 according to the specific demand thresholds for
various key sizes in Table 3.3. More importantly, MePKC using fully memorizable
private key can be specifically realized. For more information, please refer to
Chapter 9.
Multilingual key input can have optional anti-keylogging application
software (Log This, No date; McNamara, 2003) to achieve higher security. The input
method of multilingual key is normally a mouse, where it can also be other input
devices like touch screen, tablet, stylus, keyboard, sound recognition, eye-tracking
technology, Microsoft Surface, etc. The key space is increased using pictorial
colourful Unicode graphic symbols with 17 background colours and 16 foreground
colours, which can also be increased using special effects like directional shadow,
3D styles, lighting, enclosed character using shapes like circle, square, triangular, or
diamond, as well as typeface variation like font type, font size, and font format.
The (16+1) colours of colourful multilingual key in Figure 5.4 are black,
brown, red, orange, yellow, green, blue, violet, gray, white, silver, tan, salmon, gold,
khaki, and cyan for 16 foreground colours, and black, brown, red, orange, yellow,
green, blue, violet, gray, white, silver, tan, salmon, gold, khaki, cyan, and pink for 17
background colours. The first 10 colours of the (16+l)-colour scheme has good
memorizability based on the colour code of resistor. The next 6 colours are lighter
colours than the corresponding colours modulus 10. The last colour pink is used as
the front-slash-wise diagonal background colour. Other colour combinations may
also be possible.
A software prototype of this multilingual key (Lee & Tan, 2006a) has been
built up by using the Microsoft Visual Studio (Marshall, 2003). To get a copy of this
software, please email the author at [Email: E9t3iJCW@hotmail.com]. Whenever the
conditions like time, money, and online archival service allow, the author shall mail
you a CD copy or upload the software.
71
5.2 Multi-Tier Geo-Image Key
To create big memorizable secret, a second new type of graphical
password/key is invented using a hybrid combination of recognition-based
cognometrics and locimetrics over a map, as well as recall-based textual
password/key of a space name and characteristics. This space map can be continents
of Earth, seafloor of oceans, constellations of star sky, and so on.
Let's take the Earth map of continents as an example for multi-tier geo-image
key. The current best GPS (Global Positioning System) resolution for civilian usages
is about 15 meters (m) per pixel. For the latest Google super- satellite GeoEye- 1
(Chen, 2008; Wikipedia Contributor, 2008ay) launched on 6 September 2008, it
captured the first image at a resolution of 41 cm on 7 October 2008 (EDT). For spy
satellite (Wikipedia Contributors, 2008ax), the best resolution may be less than 2 cm.
Let's take 15 meters (m) per pixel in the calculation. The radius of Earth
globe is r = 6.37 x 10 6 m and its surface area is SEanh = 47ir 2 = 5.099 x 10 14 m 2 .
Assume only 2— 7 of Earth surface is memorizable populated areas like metropolis,
city, town, village, etc. Assume also a pixel represents an area of 15 2 m 2 , and a
partitioned area of Earth map at the first tier has 20 * 20 pixels. At a monitor image
resolution of 800 * 600 pixels, there are 1200 partitioned areas at the first tier of
Earth map. Simple estimation will show that four to five tiers of map are needed to
locate a specific location on the Earth surface after subsequently selected image areas.
Through some calculation, the whole Earth surface including continents and
oceans has a surface area per pixel of S P i xe i = 47ir 2 1 15 2 = 2.266 x 10 12 m 2 /pixel, or
entropy of Eearth = 41.04 bits. Considering a click area of 20 x 20 pixels after image
partitioning, the surface area per click area is Sciick = 4ur 2 1 (15 2 X 20 2 ) = 5.665 x 10 9
m 2 /click area, or entropy of 32.40 bits. When the factor of easily memorizable Earth
space like populated areas is included, the usable Earth surface to create a big
memorizable secret is S mem orizabie = 2" 7 x S c ii C k = 4.426 x 10 7 m 2 /click area, or entropy
of 25.40 bits. Hence, a partial image secret of multi-tier geo-image key has about
25.40 bits.
In addition to a partial image secret of a space, a user is also required to enter
a second partial textual secret related to the name and/or characteristics of that
72
particular selected image space or location. This is used to increase the key entropy
and to resist the shoulder- surfing attack. For every partial image secret, there shall be
a partial textual secret. Preferably, the key length of the partial textual secret is at
least 6 characters.
1000
V
Optionally activate the anti-keylogging software.
1001
Open the application software of multi-tier geo-image key for its
input interface showing an Earth map, ocean seafloor, or others.
1002
User enters a partial image secret of multi-tier geo-image key:
(1) Beginning with a first tier of Earth map showing all the continents with
resolution 800 * 600 pixels, select a first partitioned area of about 20 * 20
pixels, for a second tier of map, or as a secret and go to Box 1004 directly
(2) From a second tier of Earth map, select a second partitioned area of about 20 11
20 pixels, for a second tier of map, or as a secret and go to Box 1004 directly
(3) From a third tier of Earth map, select a third partitioned area of about 20 * 20
pixels, for a third tier of map, or as a secret and go to Box 1004 directly
(4) From a fourth tier of Earth map, select a fourth partitioned area of about 20 *
20 pixels as a secret and go to Box 1004 directly
1003
\レ
Yes
User enters a textual password/key related to the selected area
for higher entropy and resistance to shoulder-surfing attack.
f
If the key entropy is still insufficient, go to Box 1003 again and
select another geo-image area ana its related textual key.
No
f
Undergo secret processing technique(s) as in Box 404. Then,
apply the finally generated secret(s) for various applications.
/X ᄀ
1004
1005
1006
\レ
Clear the memory storing the initial, intermediate, and final
secrets. Then, close all the application software.
Figure 5.6 Operation of multi-tier geo-image key input method and system
세 007
73
If ASCII encoding is used, then the textual password/key adds another 39.42
bits. In total, a unit of multi-tier geo-image key has entropy of 64.82 bits. Some units
of multi-tier geo-image key are sufficient for many applications using secret. To
specifically realize the MePKC, three and four units of multi-tier geo-image key can
support 160- and 256-bit MePKC, respectively, using the ECC. The monitor tend
towards wide- screen LCD at lower cost shall popularize the multi-tier geo-image key
as well.
Table 3.3 shows the required unit of geo-image key for various key sizes, and
Figure 5.6 illustrates the operation of this method. The space map can optionally
have invisible and/or visible grid lines for easy references. The input method is
normally a mouse, where it can also be other input devices like touch screen, stylus,
keyboard, sound recognition, eye-tracking technology, Microsoft Surface, etc. To
further increase the key space of this method, the preceding tiers of geo-image key
before the last tier can be included, and early secret selection of larger geographical
area is allowed. Multi-tier geo-image key input can also have optional anti-
keylogging (Log This, No date) application software to achieve higher security.
To further increase the key space of this method, the preceding tiers of geo-
image key before the last tier can be included, and early secret selection of larger
geographical area is allowed. Yet another method to increase the key space is to
invest more resources to recruit the architects to draw the geographical map of
populated areas using the architectural normal scaling of 1:500 (or 1 cm : 500 cm, or
1 cm : 5 m), which is a resolution better than the civilian GPS resolution 15 m/pixel.
5.3 Multi-Factor Multimedia Key Using Software Token
To create big memorizable secret, especially for MePKC realization in
Chapter 9, the key sizes larger than 256 bits, such like 384 and 512 bits, are hard to
be memorizable, and a possible solution is multi-factor multimedia key using
software token as in Figures 5.7-5.8. For instance, 512-bit MePKC using ECC is
needed to realize the bits of security at 2t>b bits and to resist future quantum
computer attack. Hence, multi-factor multimedia key using software token is
74
invented to halve the memorizable key sizes at equivalent security levels, especially
designed for MePKC operating on the FFC or ECC.
1100
Optionally activate the anti-keylogging software.
Open the application software of multi-factor key using software
token for its input interface.
1101
1102
V
User creates an n-bit secret S like 256 bits using one or more methods as follows:
(1) Self-created signature-like Han character for CLPW and later CLPP
(2) ASCII-based 2D key
(3) Unicode-based 2D key
(4) Multilingual key
(5) Multi-tier geo-image key
(6) Conventional secret creation methods and other future methods
ᄉ X71
1103
User creates a software token T by following the steps as below:
(1) User creates and/or compresses a big electronic multimedia data file, be it
random or non-random bitstream, text, image, audio, animation, video, or
hybrid combinations
(2) User hashes the processed data file using 2n-bit hash function like SHA-512
(3) User encrypts the hash value H of multimedia data ule, using n-bit secret like
256 bits and n-bit AES like AES-256, to create the software token T
(4) To use the multi-factor key K MF , decrypt T using memorizable secret S to
retrieve hash value H, and hash the concatenation of S and H to produce K MF
K MF ^Hash(SIIH)
1104
V
User stores the software token locally in a storage device like
USB flash anve or remotely in a server for roaming purposes.
1105
Clear the memory storing all forms of secrets. Delete or hide the multimedia data
file and its processed data file. Then, close all the application software.
1106
Figure 5.7 Software token generation of multi-factor multimedia key input method
and system
75
1200
\k
Optionally activate the anti-keylogging software.
N レ
Open the application software of multi-factor key using software /^\J7I
token for its input interface.
1201
1202
\レ
User creates an n-bit secret S uke 25b bits using one or more methods as follows:
(1) Self-created signature-like Han character for CLPW and later CLPP
(2) ASCII-based 2D key
(3) Unicode-based 2D key
(4) Multilingual key
(5) Multi-tier geo-image key
(6) Conventional secret creation methods and other future methods
1203
V
User uses a software token T by following the steps as below:
(1) If the software token is in a local storage device like USB flash drive, a user
loads the software token from the storage device
(2) If the software token is in a remote server, a user downloads the software
token through roaming network
(3) User decrypts the software token T using n-bit secret S to get hash value H
(4) Hash value H optionally undergoes secret processing technique(s) together
with S as in Boxes 404 to become 2n-bit multi-factor key K MF
K MF ^Hash(SIIH)
1204
Apply the finally generated secret(s) of 2n-bit multi-factor key K
for various applications.
1205
\レ
Clear the memory storing all forms of secrets. Then, close all the
application software.
1206
Figure 5.8 Software token acquisition and application of mult i- factor multimedia key
input method and system
76
5.3.1 Related Work
A closest related work to multi-factor multimedia key has been published and
found after the patent filing of multi-factor multimedia key. This related work is
multimedia password (Mannan & van Oorschot, 2008) using hash value of a digital
object as password.
5.3.2 Using Key the Secret and USB Flash Drive
For 2n-bit ECC, where 2n can be as big as 512, its 2n-bit private key can be
derived from a memorizable secret and a 2n-bit hash value. This 2n-bit hash value is
obtained from the hashing of a big multimedia data file with its size at least 512 bits
by 2n-bit hash function like SHA-512. This multimedia data file may be random or
non-random bitstream, text, image, audio, animation, video, or hybrid combinations.
The 2n-bit hash value is encrypted by an n-bit memorizable symmetric key using li-
bit AES like AES-256 to create a software token. Here, 2n-bit ECC and n-bit AES
have equivalent bits of security strength at n bits in the scale of symmetric key
crypto system. This software token is then stored in a local storage device like USB
flash drive, floppy disk, CD-ROM, DVD, etc., or in a remote server.
5.3.3 MePKC Application with Optional Split Key Method
Whenever a user needs to use the 2n-bit MePKC like 2n-bit ECC, one is
either to get the local device storing the software token or to download it from a
server through roaming network. Then, by using n-bit memorizable symmetric key S,
one decrypts the 2n-bit software token to get 2n-bit hash value, which is later used
together with S to derive the 2n-bit private key of 2n-bit MePKC. Hence, this bi-
factor key using an n-bit symmetric key and 2n-bit software token can halve the key
sizes of MePKC by sacrificing some mobility.
This method can be extended to become mult i- factor key easily by
undergoing the similar processes in split private key cryptography (Ganesan, 1996b).
For instance, the software token may require bi-factor or multi-factor authentication,
including at least a biometrics factor to access the software token. Also, during the
77
input, multi-factor multimedia key using software token can have optional anti-
keylogging application software (Log This, No date) to achieve higher security.
5.3.4 Software Prototype
A software prototype of this multi-factor multimedia key using software
token (Lee, 2008k) with the function of multihash key (Lee, 2007a) has been built up
by using the Microsoft Visual Studio (Marshall, 2003). The multimedia key input has
optional anti-keylogging application software (Log This, No date) to achieve higher
security. To get a copy of this software, please visit [URL: www.xpreeli.com].
5.4 Hybrid Combinations
So far, there are five methods discussed independently and slightly linked on
how to create big and yet memorizable secret. These five methods are (i) Chinese-
character-encoded passphrase, (ii) 2-dimensional (2D) key, (iii) multilingual key, (iv)
multi-tier geo-image key, and (v) multi-factor multimedia key using software token.
Here, it is to note that these five methods can be applied in hybrid mode together
with the optional keys of password(s) and passphrase(s).
From psychological studies (Standing, Conezio & Haber, 1970; Standing,
1973; Jansen, Gavrila, Korolev, Ayers & Swanstrom, 2003; de Angeli, Coventry,
Johnson & Renaud, 2005), graphical secret key has better memorizability. However,
there are special attacks on graphical password/key (Thorpe & van Oorschot, 2007).
Nevertheless, there is a human memorizability limit on the number of unique
secrets that a human can have. Adams and Sasse (1999) reported a limit of 4 to 5
keys that were unrelated and regularly used. Meanwhile, Florencio and Herley (2007)
reported a limit at an average of 6.5 textual keys without any relevancy condition on
the selection of a key, except that the set of keys of a user has to be different.
Coming to here, there is a problem on how to increase the number of unique
secrets from a few master keys to some slave keys for both the offline and online
accounts. Please refer to Chapter 7 for a proposed solution called multihash key.
78
CHAPTER 6 MULTIMEDIA NOISES FOR MORE RANDOM
SECRET
6.1 Introduction
This chapter talks on the various types of multimedia noises or errors, which
can be used to create more random secret. Higher randomness means higher
complexity and harder secret cracking. Then, an enhanced frequency analysis to
decrypt the English text is presented. It is followed by the discussion of information
rates and unicity distances for some big secret creation methods. Lastly, a proof is
shown on why secret with noise(s) has higher information rate and unicity distance.
6.2 Semantic Error Occurrences in the Multimedia Communications
Since the introduction of communications technologies from analogue
communications to digital communications, the communication networks have
evolved into the ubiquitous network of Internet that triggers the Information Era. The
data transmission covers all types of media from bit stream, text, image, audio, to
video. To increase the accuracy rate of the communications, the processes of error
detection and error correction are carried out over the received data, which is
majority-wise in the binary form for nowadays communications.
Nevertheless, in this chapter, the second error level occurring in the
multimedia communications is discussed. The first error level is the bit stream;
whereas the second error level is an advanced error called as semantic error (Lee,
2005a). The semantic error occurrence is explained corresponding to the type of
media. Considering the semantic error occurrence, a protection layer can be obtained
in mining the information from the multimedia communications. It is not only
applicable to the digital media in the Silicon World, but the daily physical media as
well. Hence, we can avoid the critical errors in addition to the higher accuracy rate
during the intake process of information. It is highly useful in the field of science,
commerce, history, archaeology, etc. Specifically here, the semantic errors are
applied to add more randomness to the big secret.
79
6.2.1 Introduction
Mass, energy, and information are the three basic elements of the universe.
Meanwhile, the communications of information in the human society is one of the
two main components in the process of human civilization from Stone Age to the
Modern Age. These two components are the languages to communicate the
information and the tools to generate the functions. In the nineteen century, the first
electronic communications technology of telegraph was initialized in year 1837
(Tomasi, 1998; IEEE Communications Society, 2002). Then the analog
communications evolve to the digital communications. A good example of the
ubiquitous network will be the Internet that triggers the Information Era.
Nowadays, the data communications covers all types of media from bit
stream, text, image, audio, to video. The majority of the received data is in the binary
form via the computing devices. Both of the processes of error detection and error
correction are carried out over the received data to improve the accuracy rate of the
communications. Both of these processes have now been very well improved to
handle the first error level of the multimedia errors (Wu, Cheng & Xiong, 2001; Lu,
2002), which is the bit stream.
The works on the first error level of bit stream have been quite abundant and
very successful for the data transmission in the secure communication systems
(Schneier, 1996, 2000; Stallings, 2006b, 2007) via the applications of many types of
codes and protocols.
Nevertheless, the focus of this section is to discuss on the second error level
occurring in the multimedia communications. This second error level is an advanced
error called semantic error. The capability to detect semantic error will be somehow
able to differentiate among the neutral, true, and false statements. The semantic error
occurrence is explained corresponding to various types of media. With the
consideration of semantic error occurrence, a protection layer is obtained to mine the
information from the multimedia communications.
It is not only applicable to the digital media in the Silicon World, but the
daily physical media as well. Hence, critical errors can be avoided. In addition,
80
higher accuracy rate during the intake process of information can be achieved. It is
highly useful in the fields of science, commerce, history, archaeology, etc. By mining
the critical information of the essential constraints, various models in these fields can
be set up by using the practical intelligence. Specifically here, the semantic errors are
applied to add more randomness to the big secret.
6.2.2 Multimedia Type of Bit Stream
For the multimedia type of bit stream, it is not common in the human society,
except the I Ching (aka Yi Jing) (易 经) , until the advent of computer technologies
in the 20 th century. There are basically three groups of them in categorizing the
digital binary bit stream (B.1-B.3):
(B.l) Self-executable execution file
(B.2) No n- self-executable execution file
(B.3) Non-executable data file
The examples of (B.l) and (B.2) are the installation and execution files like
self-extractable and non-self-extractable WinZip files. For (B.3), the example is like
the Microsoft Office Word file with the file extension of .doc.
The advancement of error detection codes, error correction codes, and
cryptology (Schneier, 1996, 2000; Stallings, 2006b, 2007) have allowed the full
recovery of binary bit stream without considering the intrinsic information of the
transferred data via the secure communication systems. Therefore, the consideration
of first error level is normally sufficient for this type of multimedia. The demand for
second error level of semantic error for advanced error checking is normally not an
essential issue.
6.2.3 Multimedia Type of Text
For the multimedia type of text, it can be of monolingual and multilingual
articles. Anyway, one language system represents one knowledge system or
81
hyperspace knowledge library. Hence to learn and understand a civilization and
culture comprehensively, the text version has to be learnt in the original language.
For translated version into other language, the factors of polysemy and multimedia
paradox will make the original version and translated version to have various
disputable issues in semantics. Further categorization has two main groups (T.1-T.2):
(T.l)Hard copy
(T.2) Digital copy
Hard copy may be of handwriting and printed copies. Meanwhile the digital
copy is due to the advent of computer technologies. Nevertheless, first error level
checking is not enough for the both of them, especially for the text group of hard
copy. As an information, first error level checking here means to detect and to
correct the text in the style of one word after another word by treating the word as an
independent symbol as for the binary bit stream for its block data. Nevertheless, it is
not enough due to the associative factors of languages (Crystal, 1999; Finegan, 2004)
and linguistics (Matthews, 1997) when the context of text is taken into consideration.
Subsequently, it is essential for the second error level checking to be
implemented on the multimedia type of text. Considering the possible semantic
errors of text (T.a-T.j) as listed below, it is very important to include them in mining
the information from the multimedia type of text.
(T.a) Readability due to handwriting and printing qualities
(T.b) Copying or duplication process
(T.c) Translation process: Phonetics-, symbolics-, semantics-based
(T.d) Punctuation marks
(T.e) Erosion and dirt that change parts of the articles
(T.f) Book typesetting
(T.g) Book binding
(T.h) Usage of ancient, intermediate, and modern language
82
(T.i) Missing supporting references
(T.j) Polysemy where a word has two or more meanings
The significant examples of readability due to handwriting (T.a) are as
follows:
(T.a.l)"DaoDeJing,, (道 德经) (Book of Ethics) and "Yi Jing" (易 经)
(Book of Changes) in ancient Chinese language writing that is being
transformed into the modern Chinese language writing
The significant examples of translation process (T.c) are as follows:
(T.c.l) Books of "Greek Mythology", "Homer's Epics", "Al-Quran" (Tareq
Rajab Museum, 1998-2002), and "DunHuang Story" in the oral form
of human brain memory and human sound
(T.c.2) Books of "The Holy Bible: New Testament" ("The Holy Bible," 1997)
from English language, "The Book of God: Old Testament"
(Wangerin, 1999a) from Hebrew language, and "The Book of God:
New Testament" (Wangerin, 1999b) from Greek language
(T.c.3) Book of "Diamond Sutra" in the translated version of Chinese
language from the Sanskrit language
(T.c.4) Books of "Rig Veda", "Puranas", "Upanishad" (Xu, 1984),
"Mahabharata" (Buck, 2000a), and "Ramayana" (Buck, 2000b) in the
English and Chinese languages translated from the Sanskrit language
(T.c.5) Books of "Arabian Nights", "Kama Sutra", and "The Perfumed
Garden" in the translated version of English language from the
Arabian language
A good example is given as follows to show the effect of punctuation mark
(T.d) via a series of sentences:
83
(T.d.l) Woman without her man is a savage.
(T.d.2) Woman without her, man is a savage.
(T.d.3) Woman without her man, is a savage.
(T.d.4) Woman, without her, man is a savage.
(T.d.5) Woman without her man is a savage?
(T.d.6) Woman without her, man is a savage?
(T.d.7) Woman without her man, is a savage?
(T.d.8) Woman, without her, man is a savage?
(T.d.9) Woman without her man is a savage!
(T.d.10) Woman without her, man is a savage!
(T.d.l 1) Woman without her man, is a savage!
(T.d.12) Woman, without her, man is a savage!
The good examples of usage of ancient, intermediate and modern language
(T.h) are as follows:
(T.h.l) Book of "Sejarah Melayu" (The Malay Annals) ("Sejarah Melayu,"
1954) in the ancient Malay language
(T.h.2) Book of "Sejarah Melayu" (Shellabear, 1975) in the intermediate
Malay language
A few good examples are given below to show the effect of polysemy (T.j):
(T.j.l)Good
(T.j.2) Well
(T.j.3) Shell
(T.j.4) Lay
(T.j.5) Heart
84
6.2.4 Multimedia Type of Image
For the multimedia type of image, graphics, or picture, there are hard copy
and digital copy after the advent of computer technologies. The various images can
be categorized into eight groups (L1-L8) as follows:
(LI) Hard copy with simple black-and-white colours
(L2) Hard copy with complex black-and-white colours
(L3) Hard copy with simple multiple colours
(1.4) Hard copy with complex multiple colours
(1.5) Digital copy with simple black-and-white colours
(L6) Digital copy with complex black-and-white colours
(1.7) Digital copy with simple multiple colours
(L8) Digital copy with complex multiple colours
The first error level checking is very useful for digital copy of image.
Nevertheless, the tool of computing devices is required as an intermediate agent
between the human and the image. In addition to the first error level, the advanced
error of image as the second error level is important to be taken into consideration for
information mining. These semantic errors of image (La-Lh) may possibly occur as
listed below:
(La) Light source(s)
(Lb) Other light source(s)
(Lc) Optical properties of the viewed object
(Ld) Viewer
(I.e) Distance between the viewed object and viewer
(Lf) Medium conditions for the space of light of sight
(Lg) Relative position and velocity of light sources, viewed object and viewer
85
(Lh) Material decaying factor for the surface of the viewed object
The example of light source(s) (La) and optical properties of the viewed
object (Lc) are as follows:
(La.l) The star of Sun emits the visible light beam of white colour. It is to
note here that the basic colours of red, green and blue will compose
the white colour. The black colour will be the complement to the
white colour.
(Lc.l) The satellite of Moon is a viewed object reflecting the visible light
beam of white colour from the star of Sun. The human bare eyes will
see the Moon to be in yellow colour being the mixture of red colour
and green colour.
Hence, the multimedia type of image is not self independent for bit stream
and text, but it depends on the environment factors and viewer as well. In other
words, the information mining of image is not an objective issue but a subjective
issue.
6.2.5 Multimedia Type of Audio
For the multimedia type of audio or sound, it is either directly communicated
from the originator or indirectly communicated via a storage device. The audio data
storage can be either in the analogue form or the digital form. In the categorization
process, there are four groups (A.1-A.4) as follows:
(A.l) Aural sound (audible to human ears)
(A.2) Vocal sound (speech from human mouth)
(A.3) Environmental sound
(A.4) Music (Jacobs, 1998)
86
The first error level checking is basically over the bit stream of audio data
that is stored digitally after the advent of computer technologies. For the information
mining of audio data, it is important to consider the occurrence of second error level,
which has the semantic errors of audio (A.a-A.j) as listed below:
(A. a) Homograph where a spelling has many meaning
(A.b) Variation of a human voice like biological factor
(A.c) Pronunciation variation due to contextual factor
(A.d) Musical intonation
(A.e) Environmental factors and noises
(A.f) Situation of speaker
(A.g) Situation of listener
(A.h) Distance between the speaker and listener
(A.i) Medium conditions for the transmission of sound
(A.j) Relative position and velocity of speaker, listener and others
A few good examples are given below to show the effect of homograph (A. a):
(A.a.l)"Sea,, and "see"
(A.a.2) "Tree" and "three"
(A.a.3) "Plain" and "plane"
(A.a.4) "Flower" and "flour"
(A.a.5) "Five" and "fine"
For different musical instrument, the musical intonation will be different. The
examples of musical intonation (A.d) are as follows:
(A.d.l) Piano
(A.d.2) Guitar
87
(A.d.3) Saxophone
(A.d.4) Drum
Hence, the multimedia type of audio has lower accuracy rate than the
multimedia types of text and image in term of information mining. This is especially
true when it comes to the advanced error level of semantic error in the human-
machine, human- human, and human- machine-human communication systems.
6.2.6 Multimedia Type of Video
For the multimedia type of video or animation, it is in fact a combination of
text, image, and/or audio with the inclusion of time synchronization factor. Video is
in fact a word meaning "I see". The basic video is the body language as like the hand
signal, facial expression, gait, etc. This type of multimedia data becomes popular
after the advent of television technologies and computer technologies. There are
three main groups of video (6.1-6.3) as follows:
(V.l) Body language
(V.2) Analogue video data
(V.3) Digital video data
For the consideration of first error level of video, it is alike the error checking
process of the bit stream. For the second error level of video data, it includes all the
advanced error of semantic error as for multimedia types of text [(T.a) - (T.j)], image
[(La) - (Lh)], and audio [(La) - (Lj)]. Other than these presented semantic error, there
are other semantic errors of video data (V.a-V.c) as follows during the process of
information mining:
(V.a) Ambiguous meanings of the body language
(V.b) Time synchronization factor for text, image and audio
(V.c) Material decaying factor of the video storage media
88
The example of ambiguous meanings of the body language (V.a) is like the
polite protocol in welcoming the guest.
The example of time synchronization (V.b) is like the situation of mo vie- like
watching, where the sound system is not designed in good manner and the physical
distance creates multimedia differential error of image and audio.
In summary, the semantic error occurrences of video data have about 28
entries. Hence, the accuracy level for the multimedia type of video is lower than the
other types of multimedia in the process of information mining.
6.2.7 Duplication of Multimedia Data
After considering the semantic error occurrences for the various types of
multimedia data, it is hereby to study the ease of duplication for the multimedia. In
simple sentences, there are two types of multimedia data duplication as follows:
(D.l) Hard copy duplication directly usable by human
(D.2) Digital copy or others which require intermediate tool(s) for multimedia
data retrieval to be usable by human
Those in the subset of (D.l) are multimedia groups of text [(T.l)] and image
[(LI) - (L3)]. Meanwhile, those in the subset of (D.2) are multimedia groups of bit
stream [(B.l) - (B.3)], text [(T.2)], image [(1.4) - (1.8)], audio [(A.l) - (A.4)] and
video [(V.l) - (V.3)]. Hence, it can be concluded here that subset of (D.l) is more
human- friendly than the subset of (D.2).
6.2.8 Conclusion
In a nutshell, the multimedia error occurrences have been discussed for the
multimedia types or bit stream, text, image, audio, and video. The first error level
checking is not enough if we wish to increase the accuracy level of information
mining.
89
Subsequently, the advanced error at the second error level, which is semantic
error, is presented here for the various types of multimedia data. Also, the ease of
multimedia data duplication has been discussed.
It is hoped that Section 6.2 can help increase the accuracy level of
information mining during the multimedia communications. Expected fields for
implementation are science, commerce, history, archaeology, etc. One of the few
examples for possible practical implementation will be the decryption project for the
discovered manuscripts from the Dunhuang caves and other Silk Road sites
(International Dunhuang Project (IDP), No date).
6.3 Decrypting English Text Using Enhanced Frequency Analysis
Frequency analysis is the fundamental cryptanalytic technique besides brutal
force, threat, blackmail, torture, bribery, etc. (Schneier, 1996, 2000). Conventionally,
it is applied on monogram, bigram, and trigram together with anagramming
technique (Bauer, 2002). The efficiency of anagramming depends on the
cryptanalyst's depth of knowledge in different language features. Hence
anagramming is a trial-and-error approach due to huge deviation in different fields,
e.g. military, diplomatic, commercial, legal, and daily languages.
The frequency fluctuations among the normal frequency order of the
characters trigger the crossover problem for monogram frequency analysis.
Meanwhile, bigram and trigram frequency analyses are found to give little help.
Higher orders are unlikely to be useful. In year 1994, George Hart (1994) introduced
a novel frequency analysis approach based on word frequency to decode the
enhanced frequency analysis for systematic decryption of short English ciphertext.
The proposed protocol (Lee, Teh & Tan, 2006) in this Section 6.3 uses
combined techniques of monogram frequency analysis, keyword rules, and
dictionary checking. It is successfully tested faster on monoalphabetic substitution
cipher. Moreover, it solves the weakness of Hart's approach for complete failure
when neither one of the top 135 words is found in the ciphertext. Further
90
extrapolation is expected to be applicable to other cryptanalytic algorithms and
languages. Specifically here, the possible cracking of short password ciphertext can
be reflected.
6.3.1 Introduction
In the scientific world of secret writing, there are both the branches of
steganography using the hiding techniques and cryptography using the scrambling
techniques (Singh, 1999). To complement the cryptography, which is to reveal the
scrambled messages, the human culture achieves the first historical breakthrough in
the East via a brilliant mixture of linguistics, statistics, and religious devotion (Kahn,
1996a, 1996b). This new knowledge arena is called cryptanalysis by a brilliant
crypto logist William Friedman in 1920 (Wrixon, 1998). The etymology of this word
is from Latin "crypta", Greek "krypte" for "crypto" meaning "secret, hidden"; the
Greek "ana" for "ana" meaning "up, throughout"; and the Greek "lysys" for "lysis"
meaning "a loosing". In other words, cryptanalysis is the interception and solution of
a message by a third party. Both cryptography and cryptanalysis are collectively
known as cryptology.
6.3.2 Justification on Frequency Analysis
Among so many cryptanalytic techniques, frequency analysis or frequency
count is the most basic one other than brutal force, threat, blackmail, torture, and
bribery. The frequency analysis is in fact the anatomy of a language. According to a
book "Trattati in cifra" published in year 1470 and written by Leone Battista Alberti,
who is known as "Father of Western Cryptology", the aspect of cryptanalysis using
frequency analysis can be traced back to al-KindT, who is "The Philosopher of the
Arabs" and author of 290 books on medicine, astronomy, mathematics, linguistics
and music (Kahn, 1996a, 1996b; Bauer, 2002).
In 1987, the Arabic scientist al-KindT's treatise was discovered in the
Sulaimaniyyah Ottoman Archive in Istanbul and entitled "A Manuscript on
Deciphering Cryptographic Message" (Singh, 1999). It is believed that this
91
manuscript is the first ever known oldest description of cryptanalysis by frequency
analysis. The al-KindT's manuscript was written during the ninth century AD
containing discussions on statistics, Arabic phonetics, and Arabic syntax. Al-KindT's
explanation on the revolutionary system of cryptanalytic technique, i.e. frequency
analysis, is translated from Arabic language into English language (Singh, 1999) as
shown below. It best describes the fundamental operating principles of conventional
frequency analysis technique.
"One way to solve an encrypted message, if we know its language, is to
find a different plaintext of the same language long enough to fill one sheet or
so, and then we count the occurrences of each letter. We call the most frequently
occurring letter the 'first', the next most occurring letter the 'second', the
following most occurring letter the 'third', and so on, until we account for all
the different letters in the plaintext sample.
Then we look at the ciphertext we want to solve and we also classify its
symbols. We find the most occurring symbol and change it to the form of the
'first' letter of the plaintext sample, the next most common symbol is changed to
the form of the 'second' letter, and the following most common symbol is
changed to the form of the 'third' letter, and so on, until we account for all the
cryptogram we want to solve. "
Figure 6.1 Al-KindT's explanation on the revolutionary system of cryptanalytic
technique
All the other cultures then only knew about cryptography and not
cryptanalysis. Therefore, it is said that cryptology is born among the Arabs. In
addition to al-KindT's manuscripts, the Arabic knowledge of cryptology was fully set
forth in the section of a 14- volume encyclopaedia "Subh al-a ' sha" written by al-
Qalqashandi in 1412 (Kahn, 1996b). Al-Qalqashandi attributed most of his
cryptologic information to be from Ibn ad-Duraihim (1312-1361). Ibn ad-Duraihim-
Qalqashandi described the more analytical frequency analysis technique by using the
92
monogram first, then the two-letter word, three-letter word, and so on. Then the
concept of two-letter word gave rise to the concept of contacts of letters.
Thereafter, the Arabic cryptologic knowledge in finance, diplomacy, and
military fell for 250 years later. Nevertheless, the frequency analysis techniques
using monogram and contacts of letters developed by Arabians have become the
most universal, most basic cryptanalytic procedures. It is a prerequisite for
understanding all subsequent substitution cryptanalysis techniques (Schneier, 1996).
Almost at the same time of Ibn ad-Duraihim, the Western civilization began
the record of crypto logy around 1326 (Kahn, 1996b). Since then, the Western
cryptographic systems merged both of the code and cipher using substitution and
transposition for 650 years in both Europe and America. We call this as secret key
cryptosystem or classical cryptography (Kaufman, Perlman & Speciner, 1995).
During this period, the substitution cipher evolved from monoalphabetic substitution
cipher, to homophonic substitution cipher in 1401, to polygram substitution cipher
and polyalphabetic substitution cipher in year 1568 (Schneier, 1996). With the
advent of computer, the classical cryptography can easily be decrypted using the
frequency analysis and anagramming.
Subsequently, a new cryptographic field called as public key cryptosystem
( Stalling s, 2006b) or modern cryptography was introduced by Diffie and Hellman in
1976 (Diffie & Hellman, 1976). In practical life nowadays, both classical
cryptography and modern cryptography are used together under a hyond scheme, e.g.
IBM mainframes (Le, Matyas, Johnson & Wilkins, 1993), to gain an optimization
between the key security and computational load. Public key cryptosystem is used
for exchanging the master keys. Meanwhile, the master keys are used for distributing
the secret session keys. The session keys will then be used under the secret key
cryptosystem. Now, most of the good cryptographic algorithms combine both of the
crypto systems with the mixed usages of substitution and transposition ciphers.
This is applicable and conveniently implemented with the handy help of
nowadays computing facilities. The only difference is just that instead of the 26
elements of alphabetical characters, now we have only two elements, i.e. binary '1'
and '0' (Schneier, 1996). Although it looks more complicated, it is basically the
93
same. It is just like the analogy of numerical computations between binary, decimal,
and hexadecimal numerical systems. Hence the frequency analysis remains as the
prevailing basic requisite for cryptanalysis techniques. This paper presents an
improved approach of modified frequency analysis upon the Hart's approach (1994)
for the decryption of English ciphertext. The improved cryptanalytical approach is a
ciphertext-only attack using the combined techniques of monogram frequencies,
keyword rules, and dictionary checking.
6.3.3 Drawbacks of Conventional Frequency Analysis
At a first look into the sentences that describe the frequency analysis on
monogram, the method shall work theoretically for sufficient long texts (Bauer,
2002). However, it is found in practical tests that the frequency distribution of
English language is a science fiction.
This is due to the fact that the English texts in different circumstances deviate
between fields, e.g. military, diplomatic, commercial, legal, literary, etc. Besides,
different person may use different words at different frequencies. In addition, an
energetic language is alive and always grows with time. The vocabulary is getting
more and more abundant. It may even undergo mutation due to the enrichment of
foreign words, e.g. paddy, spaghetti, kimono, etc.
Table 6.1 Frequency analyses of various sources [ascribe to Bauer (2002)]
Frequency Counts Descending Order
Sources
eaoid hnrst uycfg lmwbk pqxz
E.A. Poe 1843
etaoi nshrd lucmf wypvb gkqjx z
0. Mergenthaler 1884
etoan irshd lcfum pywgb vkxjq z
P. Valerio 1893
etaon isrhl dcupf mwybg vkqxj z
H.F. Gaines & O.P. Meaker 1939
etoan irshd lcwum fygpb vkxqj z
L.D. Smith 1943
etoan irshd lufcm pywgb vkxzj q
L. Sacco 1951
etaon irshd lucmp fywgb vjkqx z
D. Kahn 1967
etaon rishd lfcmu gpywb vkxjq z
A.G. Konheim 1981
etaoi nsrhl dcumf pgwyb vkxjq z
C.H. Meyer & S.M. Matyas 1982
94
Hence, these factors may cause the frequency fluctuations for the alphabetic
letters in the texts. The fluctuations may then create the crossover problems when we
try to match the empirical frequency counts with the ideal frequency counts. Table
6.1 above lists the old frequency analyses for English text with only 10,000 or fewer
letters adopted from Bauer (2002). It can be observed in Table 6.1 that the frequency
counts depend on the source file at certain deviation degree. The crossover problems
in frequency analysis can be ameliorated if the ciphertext is big. A huge ciphertext
can reduce the fluctuations of letters as practically tested by Bauer (2002) on German
texts. However, it is hard to have a chance to encounter with huge ciphertext.
6.3.4 Combined Methods of Frequency Analysis
To deal with these problems, Bauer (2002) proposed the cliques and partition
matching method. Cliques are groups of letters with almost equi-frequency that are
hard to be separated. This method is proven to be good on the conditions that the
cliques are not overlapping and having a clear gap between the members of a clique.
Hence, it normally works for intermediate- size ciphertexts and not the short
ciphertexts.
In addition, Bauer (2002) suggested other advanced frequency analysis
methods. The frequency of multigrams, such like bigram frequencies of 676 symbols
and trigram frequencies of 17,576 symbols, are found to be helpful in solving the
short ciphertexts that the cliques are not separated well by monogram frequencies.
However, higher orders of /i-gram frequencies with n>4 are almost helpless.
Other combined methods proposed by Bauer (2002) were word frequencies
between two spaces, position frequencies of a letter in a word, average word length,
and word formation by alternating and/or accumulating vowels and consonants.
Although there are numerous methods here, the only aim is to mechanize the
decryption of monoalphabetic simple substitution ciphers. Instead of huge and
intermediate texts, our aim also involves the short texts. Bauer's methods fade for
short texts.
95
For short cryptograms or ciphertexts, Hart (1994) proposed an efficient
algorithm using the language model. His method of [26!] partial permutation
searched through a manageable tree of word assignments. These words are from a
listing of 135 top-ranked words of modern American English in descending order
(Kucera & Francis, 1967). Firstly, starting from the smallest /i-letter words with same
length and same pattern of repeated letters if any repeat, we compare the n-letter
words of ciphertext with the 135-word dictionary to check for any possible
deciphering. The minimum value of n is 1 and the maximum value is 7.
"QUESTION" is ranked 358th. In other words, it means there is no 8-letter word in
the 135-word dictionary.
Nevertheless, there are some drawbacks in this method as well. While dozens
of words match the general 2-letter and 3-letter patterns, higher orders of n-letter
words after that are of low possibilities to have repeated letters. "THAT" is the only
case having the first and fourth letters repeated for 4-letter words. The small size of
135- word dictionary also causes the problem of missing letters like letters T, 'Q,,
'X,, and 'Z,. Hence, one may need to do anagramming via the trial- and-error method
to get the ciphertexts in proper meaning by inspection. Therefore, the approach to
increase the size of the word dictionary is helpful. It will help decipher the missing
letters from the word dictionary.
However, this method has no usage of grammatical information and relies on
word counts. In the special case of unusual letter distributions, this cryptanalytic
technique may be confused and ran. For the worst case if no plaintext is in the word
dictionary, it will definitely fail completely at a possibility of 2~ n for n-word texts
using a 135-word dictionary. Consequently, it is our purpose here to propose an
enhanced frequency analysis technique to mechanize the deciphering of this type of
ciphertext.
6.3.5 Proposed Method: Enhanced Frequency Analysis
In this proposed enhanced frequency analysis technique, it is a three
hierarchical approach. The monogram frequencies, keyword rules, and dictionary
96
checking are implemented one by one to mechanize the full deciphering of
monoalphabetic substitution cipher.
In the first step, the monogram frequencies are computed for all of the letters
in the ciphertext. Basically, at least the letters of 'E' and T' can be identified or
deciphered. During the second step, the keyword rules are conducted to decipher the
other unknown secret letters one by one. Each keyword rule is supposed to perform
only on cipher words that have only one secret letter. This secret letter will then be
deciphered. The sequence of the keyword rules is illustrated in Table 6.2 below. It is
to note here that some of the keyword rules may have the sequence swapped. Besides,
for letters that are still not yet deciphered in the second step, they will be identified in
the third step.
Table 6.2 Sequence of keyword rules for modified frequency analysis
Sq.
Letter
Keyword
Sq.
Letter
Keyword
1
to
11
u
our, out
2
n
no, on, not
12
c
can, could
3
f
of
13
w
we, was, with
4
or, for
14
g
go, get
5
a
a, at, are
15
1
all, will, could
6
d
do, and
16
b
be, but
7
h
he, the
17
y
by, may, yes
8
i
it, in, if
18
V
have, very
9
s
so, is
19
p
up, people
10
m
from, am, me
20
k
like, back, make
In the last step, there are at least four letters "JQXZ" that have to be
recognized by using the dictionary checking or inspection. If the ciphertext still has
lots of secret letters, dictionary checking will be in favour by having the cipher words
with the least number of secret letters tested first. If the ciphertext has very few
secret letters left as for alphabets "xjqz", then the inspection method is already
sufficient to decrypt them.
This three-tier approach has been tested on two short cryptograms with the
dimensions of 9006 letters for an excerpt from the storybook of "Arabian Nights: Ali
97
Baba and the Forty Thieves" (Penguin Popular Classics, 1997) and 2802 letters for
an excerpt randomly chosen from a daily newspaper article entitled "Bangsar". It is
found that both achieve very successful deciphering results at promising
computational time. The results are plotted in Figure 6.2. Hence, the deciphering
model to mechanize the cryptanalysis of monoalphabetic substitution cipher has been
successfully developed and tested.
It is found that this enhanced frequency analysis approach performs at more
systematic and faster decryption than the Hart's approach. Moreover, due to the
special combined properties of keyword rules and dictionary checking, the Hart's
approach weakness (1994) in facing total failure when neither one of the top 135
words are in the English ciphertext could be hindered.
e t o n f radhi smucwg lbyvpkj q x z
Sequence of alphabetic letters
Figure 6.2 Implementation of enhanced frequency analysis
6.3.6 Conclusion
In a nutshell, the cryptanalytic technique of enhanced frequency analysis has
been successfully developed by using the combined techniques of monogram
frequencies, keyword rules, and dictionary checking. The proposed three-tier
40 --
60 --
V
20 --
Excerpt from "Ali Baba & the 40 Thieves"
Excerpt from "Bangsar"
(%) uo^aAJ03p> IO W^IISOJSJ
98
approach in Section 6.3 mechanizes the cryptanalysis of monoalphabetic simple
substitution cipher. It is also discovered in the research that this enhanced approach
shows improved performance from the Hart's approach in the context of English
texts. The improvements are faster ciphertext decryption and the avoidance from the
chances of total railure when none a single top 135 words is within the ciphertext.
In future, the keyword rules may be refined to have a faster deciphering speed
by rearranging the sequence order and/or the selected keyword for specific letters.
Furthermore, finer and more advanced algorithms could be established from here to
decipher the other advanced substitution and transposition ciphers, e.g. homophonic
substitution cipher, polygram substitution cipher, polyalphabetic substitution cipher,
and simple columnar transposition cipher.
It is our wish that other advanced ciphers like Playfair Cipher could be
decoded. Moreover, there are possibilities that this model could be applied to other
languages as well. The advent of Internet has created an e-life society that is not only
multidisciplinary but also multilingual. Perhaps, the Scrabble Players Dictionary
('The Official Scrabble," 2002) may become another source of idea towards the
direction of further improvement. Specifically here, Section 6.3 reflects some facts
on the possible cracking of short password ciphertext.
6.4 Passphrase with Semantic Noises and a Proof on Its Higher Information
Rate
Key size becomes very important to a cryptographic algorithm according to
Kerckhoff s law where a civilian crypto system shall depend fully on key secrecy.
Currently, there are 4 passphrase generation methods: Sentence, acronym, diceware,
and coinware. Unicity distance is the minimum ciphertext size for unique ciphertext
decipherability when number of spurious keys is zero. A key with size less than
unicity distance is good where there are spurious keys which allow a protection
method using limited unsuccessful logins. Here (Lee & Ewe, 2007d), stronger forms
of passphrases using textual semantic noises like punctuation marks, mnemonic
substitution, misspelling, and associative morphing, whicn improve the key entropy,
are proposed. An ASCII mutual substitution table is presented together with its proof
99
on information rate increment. Higher information rate has lower redundancy, and
hence bigger unicity distance ensures encrypted keys the short cryptogram in a key
vault, like Password Safe, cannot be cracked within certain limited login attempts.
6.4.1 Introduction
Key is one of the four main groups of entity authentication for identification.
These four groups are "something known", "something possessed", "something
inherent", and "someone known" (Menezes, Oorschot & Vanstone, 1996). Key is a
secret only known to the authenticated entity, where its low cost, mobility, and wide
compatibility, makes it to be the most popular authentication method.
Kerckhoff s law is applied in civilian crypto system, where the strength of a
crypto system is fully dependent on the key secrecy (Schneier, 1996). In other words,
key size is the main factor of a cryptographic algorithm. Short key is called password
and long key is called passphrase. FTPS PUB 112 (Federal Information Processing
Standards Publication 112) dated 30 May 1985 on password usage (NIST, 1985b)
defined password to be a key with a length of 4 to 8 characters and passphrase as a
key with a length of 9 to 64 characters.
To estimate the key entropy, NIST (National Institute of Standard and
Technology), USA, published an electronic authentication guideline (Burr, Dodson
& Polk, 2004, 2006; Burr, Dodson, Perlner, Polk, Gupta & Nabbus, 2008). However,
the estimation of user-chosen key entropy is based on Shannon's information theory
(Shannon, 1948) and English information rate (Shannon, 1951; Cover & King, 1978)
using 2o English alphabets plus one space character. For more accurate figures, the
English information rate is in fact shall be based on 95 ASCII printable characters,
where its limiting (infinite- length history) conditional entropy is available in (Brown,
V. J. D. Pietra, Mercer, S. A. D. Pietra & Lai, 1982; Tsou, Lai & Chow, 2004).
A good key shall be strong and memorizable. A strong key has high entropy
and high randomness. Meanwhile, a memorizable key has reasonable secrets to be
remembered. Weak key is not in favourite (Klein, 1990; Spafford, 1992a, 1992b).
Random key is strong but not memorizaole. Hence, this thesis proposes keys with
100
balanced features of strength and memorability (Kurzban, 1985; Bugaj, 1996; Yan,
Blackwell, Anderson & Grant, 2004).
Due to the long key size demand for symmetric key algorithm and
asymmetric key algorithm (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b;
Gehrmann & Naslund, 2005, 2006, 2007), password is no longer enough and
passphrase (Schneier, 1996; Menezes, Oorschot & Vanstone, 1996; Stalling s, 1995)
is needed. For the popular email encryption software, PGP (Pretty Good Privacy)
version 9.0, the allowed key size comes to a maximum of 255 characters (PGP
Corporation, 2006). Nowadays, many modern operating systems support a maximum
key field of 255 characters.
For the entry of passphrase, there are currently four input methods: Sentence,
acronym, diceware (PGP Corporation, 2006) and coinware (Lee & Ewe, 200oj. In
this section, a stronger form of passphrase is proposed to have more spurious keys by
using the semantic noises or semantic errors (Lee, 2005a) like punctuation marks,
misspelling, mnemonic substitution, and associative morphing (Bugaj, 1996).
6.4.2 Key Sizes and Passphrases
The minimum symmetric and asymmetric key sizes for different protection
periods are given by (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b;
Gehrmann & Naslund, 2005, 2006, 2007) as in Tables 3.1 and 3.2.
The ASCII entropy is 6.57 bits/letter. Hence, many key sizes are challenging
the human memorizability limit. For asymmetric key algorithm before the MePK ᄂ,
the long key sizes make it impossiole to be memorizable in ASCII encoding code
and require encrypted private key stored in the computing device. A user has to
remember the shorter symmetric key used to protect the encrypted private key.
Hence, asymmetric key algorithm before the MePKC is normally having the
portability and mobility proolems of private key. From Table 3.1, the minimum key
size for smallest general purpose level with a maximum of 2-year protection or
before year 2010 is 80 bits. If ASCII is used, it needs 13 characters to fulfil the key
size requirement. Hence, passphrase shall be used as compared to password.
101
There are four types of passphrase generation methods (Lee & Ewe, 2006):
Sentence, acronym, diceware (PGP Corporation, 2006), and coinware (Lee & Ewe,
2006). Sentence-type and acronym-type passphrases are subject to computational
analysis of word frequency distribution. Meanwhile, diceware and coinware are
immune to the computational analysis due to the feature of random word selection
from dictionary and self- created word list(s).
Sentence-type passphrase uses an entire phrase or full sentence to form a key.
Acronym-type passphrase applies abbreviation of first, second, last, etc., letters of
each word in a sentence. Diceware uses dice to choose a word from an ordered word
list. The word list can be in any language and based on senary or base- 6 numeral
system. Coinware is similar to diceware except it uses coin to select from a word list
that can be monolingual, bilingual, or multilingual. It is especially efficient for word
list in binary, octal, and hexadecimal orders. There are readily built word lists for
Han characters in Unicode-encoded CJK languages.
6.4.3 Unicity Distance and Passphrases with Semantic Noises
Capitalization and permutation are the prior arts to increase the passphrase
entropy (Stallings, 1995). Mnemonic substitution and associative morphing are other
forms of prior arts. The latter two methods are presented in very brief manner
without a proof (Bugaj, 1996). Here, these four methods are generalized together
with another two methods from the author's research project, i.e. punctuation marks
and misspelling, as passphrase with semantic noises, and propose a user template of
ASCII mutual substitution table, which comes together with a proof on the
information rate increment.
Passphrase with semantic noises has higher information rate (r), lower
redundancy (D) (Ritter, 2001; Wikipedia Contributors, 2008f), and hence bigger
unicity distance (n ). Unicity distance (Stinson, 2002; Wag staff, 2003) is the
minimum ciphertext size for unique decipherability of ciphertext given sufficient
decryption time, when number of spurious keys (F) is zero. The larger the difference
between the unicity distance and key length, the more the spurious keys, and the
stronger is the protection method using limited login attempts. Special key
102
management algorithms allow multiple site keys (aka slave keys) to be created from
a master key (Yee & Sitaker, 2006; Lee & Ewe, 2007a). This further permits each
short cryptogram of keys in a key vault like Password Safe to be encrypted by
different slave keys. The decoding of short cryptogram has been studied by Hart
(1994). Faster decryption can be achieved using an enhanced frequency analysis (Lee.
Teh & Tan, 2006). The relationships of information rate, absolute rate like random
signal (R), key entropy (H(K)), ciphertext size (n), and umcity distance are given in
Equations (6.1-6.4).
D = R_r (6.1)
F>2 H(K) " nD -l (6.2)
n > H(K) / D when F = (6.3)
r| ^> D| ^> Ft ,n t. (6.4)
For instance, English text has r = 1.3 bits/letter for 27 symbols (a, b, c, ..., z,
space) (Shannon, 1951; Cover & King, 1978). The redundancy is R = 4.75 bits. If
AES-128 is used, H(K) = 128 bits. Hence, n = 128/3.45 = 38 characters. For 95
ASCII printable characters, the upper bound of r based on English language becomes
1.75 bits/letter (Brown, V. J. D. Pietra, Mercer, S. A. D. Pietra & Lai, 1982). The
revised n = 128/(8-1.75) = 21.
Below are the examples of passphrases with semantic noises using
punctuation marks, misspelling, mnemonic substitution, associative morphing,
capitalization, and permutation. Punctuation mark is the easiest. A user is encouraged
to embed semantic noises for all types of passphrases: Sentence, acronym, diceware,
and coinware. Wing ate and Sinden (2002) have written a book on how to create short
text messages. SMS (Short Message Service) language (Wikipedia Contributors,
2008ag) and text messaging (Wikipedia Contributors, 2008ah) are other good
references. The presence of these spurious keys is very useful for the case of limited
login attempts, where unique cryptanalysis is impossiole.
103
Actual key: Woman without her man is a savage.
Semantic noises: Punctuation marks and permutation {
Woman without her, man
is
a savage.
Woman without her man,
is
a savage.
Woman, without her man
is
a savage.
Woman without her, man
is
a savage?
Woman without reh man,
si
a savage?
Woman, without reh man
si
a savage?
Woman without her man
is
a savage!
Woman without her, man
is
a savage!
Woman without reh man,
si
a savage!
Woman, without reh man
si
a savage!
}
Actual key: To be, or not to be: That is the question.
Semantic noises: Misspelling and capitalization {
To be? or not to be? That is the question?
To be, or not to be? that is the question!
TO 6e? Or nOt tO 6e? th@t i5 the que5ti0n?
To be! Or not to be! That is the question!
TO BE! OR NOT TO BE! THAT IS THE Question!
To we, or not to we: That is the question.
To me, or not to me: That is the question.
To be, of not to be: That is the question.
}
104
Actual key: Ballon, Address? Atmel. -Star-
Semantic noise: Mnemonic substitution {
B@! ! On, Address? Atmel. -Star-
Ballon, Address? @mail. -Star-
}
Semantic noise: Associative morphing {
Ballon, +++re$$? Atmel. -Star-
Ballon, Address? Atmel.
B@!!0n, +++re$$? @mail. ~****~
}
Table 6.3 ASCII mutual substitution table
aA
bB
cC
dD
eE
fF
gG
hH
il
jJ
A
6
<
ol
3
1=
9
l-l
I
?
kK
1L
mM
nN
oO
pP
qQ
rR
sS
tT
l<
1
TVI
TV
lo
&
1-
5
+
uU
vV
wW
xX
yY
zZ
1
2
3
[J
\/
VV
><
7
2
1
Z
E
4
5
6
7
8
9
+
*
1
h
S
b
L
B
g
t
X
1
%
[
]
(
)
<
>
o/o
eq
[
]
<
>
(
)
I
#
$
&
i
n
m
Q
*
dot
?
@
\
A
1
space
j
at
A
\
1
A v
CamelCase
105
6.4.4 Proof of Higher Information Rate
Here, an ASCII mutual substitution table is presented as user template to
create passphrase with semantic noises. A user can modify any mutual substitution of
these ASCII characters in Table 6.3. CamelCase (Wikipedia Contributors, 2008g)
makes compound words or phrases in which the words are joined without spaces and
are capitalized within the compound. The ASCII substitution is a token with one or
more characters. The probability of the initial token letter is used as the token
probability, where the difference is assumed to be small and negligible.
The upper bound of information rate (r) (Shannon, 1951; Cover & King, 1978)
is given by Equations. (6.5-6.6), where q N t is the probability for predictor to discover
the correct letter following a sequence of N-l symbols in i guesses, i indexes one of
the 95 ASCII printable characters.
qf =!>C /いん,…, ん— いん) (6.5)
Z^f -^ + i)log 2 i<r< -|>デ bg 2 qf (6.6)
Due to the mutual substitution of ASCII printable characters, 9^ q , becomes
about 48 pairs. Every two different q\ with different probabilities are paired to share
the same probability. Let one of these pairs has probabilities A and B before mutual
substitution, and probability C after mutual substitution. Let other ASCII characters
have a combined probability D, where (A + B + D = 1) and (A + B)/2 = C. The
inequality Equation (6.7) can be proven using differentiation of calculus dy2/dA in
Equation (6.11) as derived from Equations (6.8-6.10). yi is a constant and yi has an
absolute minimum value equal to yi at A = B = (1 - D)/2. The other two critical
points, A = and 1 - D, share the same absolute maximum value. Table 6.4 shows
how to determine the critical points of function y2.
_ 2C * log 2 C > _ A * log 2 A _ B * log 2 B (6.7)
C 2C < A A B B (6.8)
((1 - DV2) 1 " < A A (1 - D - A) 1_D " A (6.9)
106
y 1 = ((l-D)/2) 1D
y 2 = A A (l-D-A) 1DA
(6.10)
(6.11)
Inequality Equation (6.6) can be further extended to three or more mutually
substituted ASCII characters for higher information rate increment. The best case is
all the ASCII characters can be mutually substituted, which creates the highest
information rate like absolute rate the random signal, where unicity distance will
become infinite. However, this is just an ideal dream. What we can do is to approach
the dream as close as possible. As in Equation (6.4), higher information rate has
more spurious key.
y 2 ,(A) = dy 2 /dA = y 2 In (A / (1 - D - A)) (6.12)
y 2 ,,(A)= d 2 y 2 /dA 2 (6.13)
y 2 ,,(A) = (dy 2 /dA) * In (A / (1 ᅳ으 A)) + y 2 * (1/A + 1/(1 ᅳ으 A)) (6.14)
When y 2 ,(A) = 0, then A = (1 - D)/2. (6.15)
Other critical points are A = and (1 -D). (6.16)
Since y 2 ,,(A = (1 - D)/2) = +ve,
then A = (1 — D)/2 is an absolute minimum value. (6.17)
y 2 (A = 0) = y 2 (A=l_D) (6.18)
Table 6.4 Determination of the critical points of function y2
Critical Points
A =
A = (l -D)/2
A= 1 _D
Leftofy 2 '(A)
-ve
+ve
Right ofy 2 '(A)
-ve
+ve
Types of Extreme
Values
Absolute
Maximum
Absolute Minimum
Absolute
Maximum
6.4.5 Conclusion
Here, stronger form of passphrase is proposed using semantic noises
generalizing the punctuation marks, capitalization, permutation, mnemonic
107
substitution, associative morphing, and misspelling. Passphrase with semantic noises
has higher information rate, bigger unicity distance, and more spurious keys, which
strengthens the login protection with limited attempts. In addition, an ASCII mutual
substitution table and its proof on information rate increment is provided.
6.5 Information Rates and Unicity Distances
Below are the denotation to show the information rates and unicity distances
of ASCII-based 2D key, Unicode-based 2D key, black-and-white multilingual key,
and colourful multilingual key. Unicity distance is the minimum size of ciphertext
for the unique decipherability of ciphertext when given enough time.
n = unicity distance (6.19)
F = number of spurious keys (6.20)
K = key (6.21)
H(K) = key entropy (6.22)
D = R-r (6.23)
where D = redundancy, R = absolute rate like random signal, r = information rate
F>2 H(K) — nD _l (6.24)
n > H(K) / D when F = (6.25)
For limiting conditional entropies of English language (Shannon, 1951;
Cover & King, 1978; Brown, V. J. D. Pietra, Mercer, S. A. D. Pietra & Lai, 1982;
Yannakoudakis & Angelidakis, 1988), Chinese language (Fossum, No date; Vines &
Zobel, 1998; Zhang, Xu & Huang, 2000; Tan & Yap, 2001; Tsou, Lai & Chow, 2004;
Li, Hu, Wang & Dai, 2005), Malay language (Tan, 1981), and various languages
(Behr, Fossum, Mitzenmacher & Xiao, 2002, 2003), these are the references.
English = 1.3 bits/letter (26 alphabets + space), 1.75 bits/ASCII character (6.26)
Chinese = 4.0462, 4.1, 4.5, 5.17 bits/character from four different studies (6.27)
108
For the information rate and unicity distance of ASCII-based 2D key:
D = 8- 1.75 = 6.25 (6.28)
n (128-bit key) = 128/6.25 = 20.48 (6.29)
n (256-bit key) = 256/6.25 = 40.96 (6.30)
Number of required ASCII characters (128-bit key) = 128/6.57 = 19.48 (6.31)
Number of required ASCII characters (256-bit key) = 256/6.57 = 38.96 (6.32)
For the information rate and unicity distance of Unicode-based 2D key:
D= 16-4.1 = 11.9 (6.33)
n (128-bit key) = 128/11.9 = 10.76 (6.34)
n (256-bit key) = 256/1 1.9 = 21.51 (6.35)
Number of required Unicode symbols (128-bit key) = 128/16 = 8.00 (6.36)
Number of required Unicode symbols (256-bit key) = 256/16 = 16.00 (6.37)
For the information rate and unicity distance of black-and-white multilingual key:
R= 17 + 3 (6.38)
r = 4.1 + 3 (6.39)
D = 20- 7.1 = 12.9 (6.40)
n (128-bit key) = 128/12.9 = 9.92 (6.41)
n (256-bit key) = 256/12.9 = 19.84 (6.42)
Number of required image selections (128-bit key) = 128/20 = 6.40 (6.43)
Number of required image selections (256-bit key) = 256/20 = 12.80 (6.44)
Number of required image selections (236-bit key with 20-bit key strengthening)
= 236/20= 11.80 (6.45)
109
For the information rate and unicity distance of (16+1) colourful multilingual key:
R= 17 + 3 + 8
(6.46)
ri = 4. 1 + 3 + 8 (colours encoded as digits)
(6.47)
or r 2 = 4.1 + 3 + 1.75 (colours encoded as alphabets)
(6.48)
II
00
II
o
ᅳ s
II
00
bo
ᄂ /i
II
1 ~ '
ᄂ n
(6.49)
n i (128-bit key) = 128/12.9 = 9.92
(6.50)
n i (256-bit key) = 256/12.9 = 19.84
(6.51)
n 02 (128-bit key) = 128/19.15 = 6.68
(6.52)
n 02 (256-bit key) = 256/19.15 = 13.37
(6.53)
Number of required image selections (128-bit key) =
128/28
= 4.57
(6.54)
Number of required image selections (256-bit key) =
256/28
= 9.14
(6.55)
Number of required image selections (236-bit key with 20-bit key strengthening)
= 236/28 = 8.43
(6.56)
If the numbers of required ASCII/Unicode characters and image selections (T)
are less than the respective unicity distance, then there will be no unique
decipherability. The more spurious keys, the better it is. For higher information rate
and smaller T, then there are more spurious keys when T < no. Setting an attempt
limit to open a key vault using a master key can then become a possible method of
protection. Equations (6.57-6.60) show the required formulas to estimate the unicity
distance and T.
Let T = numbers of required ASCII/Unicode characters
and image selections. (6.57)
F > 2 H(K) — TD — 1 when n = T, T く n (6.58)
T > (H(K) - log 2 (F + 1)) / D = n — (log 2 (F + 1))/D (6.59)
110
log 2 (F + 1) > D(n - T)
(6.60)
Moreover, to know the information content of selected images as secret key
in some of the big secret creation methods, please refer to Tavakoli (1991).
Ill
CHAPTER 7 MULTIHASH KEY
7.1 Introduction
There are lots of situations that require a user to have many online and offline
accounts. Examples of online and offline accounts are login access and file
encryption, respectively. For safer security, a secret cannot be re-used to avoid
password domino cracking effect (Ives, Walsh & Schneider, 2004), where an
attacker starts the password cracking process from the weakest link. However,
according to R. Kanaley (2001), an Internet user manages an average 15 keys on a
daily basis. Yet in another survey by Adams and Sasse (1999), a user can only be
expected to handle 4 to 5 unrelated and regularly used keys. For user's unique keys
without the constraint of relevancy, Florencio and Herley's survey (2007) reported
an average 6.5 keys, repeated 3.9 times each for 25 accounts and typing 8 keys daily.
Hence, there is a memory burden to the user unless these secrets are written down
somewhere. However, important password the secret is discouraged to be jotted
down somewhere.
7.2 Multiple hashes of single key with passcode for multiple accounts
A human' s e-life needs multiple offline and online accounts. It is a balance
between usability and security to set keys or passwords for these multiple accounts.
Password reuse has to be avoided due to the domino effect of malicious
administrators and crackers. However, human memorizability constrains the number
of keys. Single sign-on server, key hasmng, key strengthening, and petname system
are used in the prior arts to use only one key for multiple online accounts. The unique
slave keys (aka site keys) are derived from the common master secret and specific
domain name. These methods cannot be applied to offline accounts such as file
encryption. New method and system are invented to be applicable to offline and
online accounts. It does not depend on http server and domain name, but numeric 4-
digit passcode, key hashing, key strengthening, ana hash truncation. Domain name is
only needed to resist spoofing and phishing attacks of online accounts.
112
7.2.1 Introduction
For friendly environment, cost effectiveness, and efficiency, human
civilizations are heading towards a paperless and electronic society. Every human is
getting numerous offline and online accounts. These accounts require authentication
to gain system access. There are four types of authentication approaches: Secret,
token, biometrics, and introducer.
Secret is about something you know like password or key. Token is about
something you have like smart card. Biometrics is about something you are like fin-
gerprint. Introducer is whom you know. For the sake of cost and compatibility, secret
in the form of key is the most popular authentication approach.
According to Forrester Research (Kanaley, 2001), an active Internet user
manages an average of 15 keys on a daily basis. Most people, who are majority-wise,
not using the password management tools, either maintain the same key for all the
accounts, write down different keys for different accounts, or keep closely related
keys for various accounts. These are all poor password management practices.
The HTTP basic authentication protocol (even over SSL) (Franks, Hallam-
Baker, Hostetler, Lawrence, Leach, Luotonen & Stewart, 1999) allows a server to
know the key of each account. Tms causes possible malicious server attacks from the
administrators and crackers. The server may be untrustworthy or compromised.
For another HTTP specification, i.e. HTTP digest authentication protocol,
challenge-response protocol is used (Franks, Hallam-Baker, Hostetler, Lawrence,
Leach, Luotonen & Stewart, 1999). The server can still see the clients' keys. Since
the response from a client to a server is not specific to the server, HTTP digest au-
thentication protocol is vulnerable not only to malicious server attacks, but password
file compromise attacks, spoofing attacks, and phishing attacks.
If a key is reused, the success of an attack on an account in a weak system
may cause a strong system to be compromised. This password reuse can trigger a
domino effect from the weakest system to the strongest system (Ives, Walsh &
Schneider, 2004).
113
Therefore, every key has to be uniquely set for each account, regardless of
weak or strong system, to get rid of the risk when one system is compromised.
However, according to (Adams & Sasse, 1999), users can only be expected to cope
with a maximum of four or five keys that are unrelated and regularly used. When key
relevancy is allowed, a user can cope with average 6.5 unique keys (Florencio &
Herley, 2007). This reflects the need to balance the usability and security.
To address this problem, some key management tools are invented. These
tools allow users to remember only one master secret as master key and assign
unique keys to multiple accounts. They allow users either to choose their own master
key and then store the site keys (aka slave keys) somewhere safe, or to assign fixed
keys to each website that can be computed whenever they are needed.
The examples of the first approach are Password Safe and Windows Live ID.
The examples of the second approach are LPWA (Lucent Personal Web Assistant),
HP Site Password, Password Multiplier, SPP (Single Password Protocol), PwdHash,
and Passpet. A special example using the hybrid approach is CPG (Compass
Password Generator).
Password Safe is a password vault that can be used for offline and online
accounts. However, its mobility is low due to the requirement to have a safe storage
for multiple keys encrypted by a common master key. Another form of solution for
online accounts only is to use a single sign-on server and its proxy servers. Microsoft
Windows Live ID (aka Microsoft Passport Network) is one of these examples. Its
weaknesses are single point of failure and high cost or integration.
Another method to reduce the memory burden of online account passwords
uses key hashing and key strengthening (aka key stretching) of a master key
concatenated with a domain name and optional username. Exemplary applications of
this method are (i) LPWA (Lucent Personal Web Assistant) (Gabber, Gibbons,
Matias & Mayer, 1997); (ii) HP Site Password (aka System-Specific Passwords or
Site-Specific Passwords) (Karp & Poe, 2002; Karp, 2003); (iii) Password Multiplier
(Halderman, Waters & Felten, 2005); (iv) PwdHash (Ross, Jackson, Miyake, Boneh
& Mitchell, 2005); and (v) Passpet (Yee & Sitaker, 2006).
114
There is also a method using unique random number assignment to different
online accounts called CPG (Compass Password Generator) (aka Common Password
Method) (Luo & Henry, 2003). Yet there is another method using the key hashing of
one-time ticket, server name, and master password to generate different site keys
(aka slave keys) called SPP (Single Password Protocol) (Gouda, Liu, Leung & Alam,
2005).
All these methods of single master key generating multiple site keys or slave
keys apply only to online accounts having a domain name. Its weakness is a change
of master key requires all the accounts to be updated one by one, which is required
by some key management strategies.
For offline account, the current prior art uses a password vault to store all the
unique passwords the secret. These password vaults can be simply an encrypted
spreadsheet or document file, or application software like Password Safe by Bruce
Schneier [URL: http://www.schneier.com/passsafe.html]. The disadvantage of
password vault is its low mobility and danger of disclosing the ciphertext of
password vault to the public domain. Hence, there exists a need to have a method to
generate multiple slave keys of online and offline accounts from a master key, and
yet an individual slave key can be changed without changing the master key and
other slave keys.
With the realization of big memorizable secret for cryptographic,
information- hiding, and non-cryptographic applications, especially MePKC, there
are even more types of offline accounts like asymmetric private key, stego-key,
symmetric watermarking key, asymmetric watermarking private key, and PRNG
seed. Among them, for MePKC cryptographic applications like encryption, signature,
authentication, key exchange, and other schemes, different schemes require a
different pair of asymmetric key pair, by the technical and law requirements to have
a safer electronic information society. Hence, there exists a need to generate multiple
private keys as slave keys from a common memorizable master key.
The present invention (Lee & Ewe, 2007a) can be applied to offline and
online accounts with good mobility. Domain name is not necessary but optionally
needed to resist phishing attacks and spoofing attacks. A single sign-on server is also
115
not needed. The required components are numeric 4-digit passcode, key hashing, key
strengthening, and hash truncation.
To allow diversity of site keys from a single master key, there are two
optional entries: Username ID and domain name (or website) URL. Domain name
that is also used to resist phishing attacks can be replaced by adopting an anti-
phishing tool. In other words, the proposed new method and system can be used
together with an anti-phishing tool.
These anti-phishing tools are SpoofStick, Netcraft Toolbar, Earthlink Toolbar.
SiteKey, DSS with SRP (Dynamic Security Skins with Secure Remote Password
Protocol), Petname Tool, TrustBar, and Passpet (Yee & Sitaker, 2006).
7.2.2 Related Works
Here, the prior arts of key management tools are discussed, where a single
key can be used for multiple accounts, in a deeper context. Anti-phishing tools will
not be discussed. Accounts are divided into two types: Offline and online. Offline
accounts have no domain name while online accounts have domain name. Example
of offline accounts is file encryption; whereas example of online accounts is email.
Password Safe is an application software originally developed by Bruce
Schneier [URL: http://www.schneier.com/passsafe.html]. It uses the Twofish
encryption algorithm to protect the stored passwords by a master password. Users
need only to remember one master password to access multiple passwords. Its
mobility depends on the available password database. It can be used for both offline
and online accounts, but cannot resist spoofing attacks and phishing attacks.
Windows Live ID (No date) is also known as "Microsoft Passport Network"
[URL: http://www.passport.net]. Users need a master password to sign on a central
server. This central server will authenticate users for multiple servers which have
joint network. Besides single point of failure, it has high cost or integration. Some
security loopholes are reported (Kormann & Rubin, 2000). It can be used for online
accounts only, but can resist phishing and spoofing attacks.
116
LPWA (Gabber, Gibbons, Matias & Mayer, 1997; Matias, Mayer &
Silberschatz, 1997) uses key hashing of master password and domain name to
generate a specific site password via a server. It has single point of failure but not the
high cost of integration. However, the malfunction of central authority will mean the
breakdown of all services. It can be used for online accounts only and can resist
phismng and spoofing at-tacks. Nowadays, it has stopped providing the services.
HP Site Password (Karp, 2003; Karp & Poe, 2004) is also called "System-
Specific Passwords" or "Site-Specific Passwords". A master password and a system
name are concatenated, hashed using MD5 (Rivest, 1992) and converted into Base64
encoding (Borenstein & Freed, 1992) to get a site password. It is not centralized
using a server but operates as stand-alone application in the terminal computers. It
can be used for online accounts only and cannot resist phishing and spoofing attacks.
It is important to note here there were few successful collision attacks over
the MD5 in the years 2004-2006 (Wikipedia, 2008r). The successor of MD5, which
is SHA-l, is also discovered to be subject to collision attacks on its reduced version
in the years 2004-2006 (Wikipedia, 2008w). Consequently, NIST announced that
SHA-l would be phased out by the year 2010 in favour of SHA-2 variants: SHA-224,
SHA-256, SHA-384, and SHA-512 (NIST, 1995a, 2002b; 2007b; Lilly, 2004).
CPG (Luo & Henry, 2003) is also called "Common Password Method". It
assigns unique random numbers to different website accounts. The random number is
hashed using MD5 and converted using a binary-to-text transform to generate a
specific password for multiple accounts. The random number is encrypted and stored
in an account server or proxy server. When a user needs to access a specific account,
the encrypted random number is retrieved from the server, decrypted, hashed, and
converted into a specific password to authenticate the access. Therefore, it has the
weakness of single point of railure, but does not involve the high integration cost like
LWPA. It is for online accounts only and can resist phishing and spoofing attacks.
Password Multiplier (Halderman, Waters & Felten, 2005) uses key hashing
and key strengthening. There are two levels of hash iterations using the inputs of
username, master password and site name. Both the numbers of hash iterations are
fixed for 100 seconds and 1/10 second, respectively. It is a stand-alone application
117
without using a server and implemented using browser extension to Mozilla Firefox.
It can be used for online accounts only and can resist phishing and spoofing attacks.
SPP (Gouda, Liu, Leung & Alam, 2005) is also a stand-alone application. It
applies the techniques of challenge-response protocol, one-time server- specific ticket
and key hashing using MD5 or SHA-1. The site password is hashed from the one-
time ticket, server name, and master password. The one-time ticket and site password
will be updated after every login access. It can be used for online accounts only and
can resist phishing and spoofing attacks.
PwdHash (Ross, Jackson, Miyake, Boneh & Mitchell, 2005) is implemented
using browser extensions to Mozilla Firefox, Internet Explorer, and Opera. Its key
hashing inputs the domain name of remote site into a pseudo-random function
controlled by user's master password. The domain name acts as a hash salt. It can be
used for online accounts only and resist pmshing and spoofing attacks.
Passpet (Yee & Sitaker, 2006) is also implemented using browser extension
to Mozilla Firefox. It applies the techniques of petname system, key hashing, key
strengthening, and UI customization. Petname system is a naming system possessing
the properties of globality, security and memorizability (Wikipedia, 2008k). It is
used for anti-pmshing attacks. Key hashing and key strengthening in Passpet are
alike the Password Multiplier using the SHA-256, except that its first level of hash
iterations is flexible in amount allowing updates according to the computer
technology advancement without changes of software. It uses local storage for login
access via a fixed machine, and remote storage in a server for login access with
mobility feature. The remote server stores the first level of hash iterations and site
label file that is encrypted from the site label list. Due to the dependency of server for
newly used machines, Passpet has some risks of single point of failure. However,
there is no high cost of integration. It can be used for online accounts only and can
resist phishing and spoofing attacks.
7.2.3 Basic Model of Multihash Key
The proposal here requires users to remember an at least 128-bit master key
and a numeric 4-digit passcode. Tms method and system is named "multihash key".
118
The passcode is used together with key hashing, key strengthening (Manber,
1996; Abadi, Lomas & Needham, 1997, 2000; Kelsey, Schneier, Hall & Wagner,
1997) and hash truncation to generate exemplary 20 unique hashes at 20 security
levels for 20 accounts. Each security level has one account. These hashes are site
keys. All the security levels are ranked from the highest security (#1) to the lowest
security (#20). This is because knowing the multihash key at the higher level can
reveal the multihash key at the lower level, but not the reverse.
From Kanaley's survey (2001), 20 accounts are set since an active Internet
user manages an average of 15 keys daily. Five accounts are added by assuming that
there are five offline accounts. The number of accounts can be increased by changing
the settings or remembering another pair of (master key, passcode).
There are three pseudo-codes for multihash key to show how the method and
system work: Determination of hash iterations of multiple security levels, generation
of multihashes as site keys, and changes of key pair (master key, passcode).
As an example, Figure 7.1 shows the determination of 20 security levels via
the experiments to locate the lower bound &ᄂ and upper bound bu for 1 -second hash
iterations for an old computer that is slow but still popular. Each security level is
partitioned by 2 8 .
1400
V
Settings to determine the lower and upper bounds of 1 -second hash iteration:
(1) b L = lower bound for 1 -second hash iteration
(2) Z? H = upper bound for 1 -second hash iteration
(3) Si = security level (Z = 1, 2, 3, . . ., x), where x = 20, 32, or other values
(4) Si = nighest security level, s x = lowest security level
V
Determination of bound bi for each security level め is as follows:
(1) bi ᅳ— 0.2b L + 2 8 x (/ - 1), bi < 2. A
(2) i^i-l
(3) If i = 0, exit; else go to step 1 of Box 1402 again.
Figure 7.1 Pseudo-code to determine the numbers of hash iteration for multiple
security levels of multihash key methods and systems
119
Figure 7.2 presents the basic model of multihash key to generate multihashes
as site keys. A user needs to remember the selected security level for a specific
account. In case of forgetfulness, all the 20 security levels shall be tried one by one.
1500
V
Settings to create various slave keys d s (aka site keys) of multihash key:
(1) Necessary entries: Master key d, numeric y-digit passcode d n where y can be 4
(2) Optional entries: Username ID, domain name URL, or else NULL
(3) Bounds of hash iteration for various security levels s, : b u b 2 , b 3 , b b . . ., b x
(4) User selects security level S} among x security levels, where x = 32 or others
(5) Use 2n-bit hash function where 2n > 512 like SHA-512
Processing the master key d and passcode d n to create the determinants H b of hash
iteration number for each security level within their bounds:
(1) H b <— SHA-512 (d II d n , 1) for one round of hash iteration
(2) H b (z\ , Zi) = bit truncation of H b from bit z\ to bit zi
V
Calculate the hash iteration number j of a slave key:
(1) Choose either Fixed or Random j
(2) if Fixed
if i =1, j ᅳ (ゎ广 2 8 +l) + H b (0 , 7), j<b, ;
else if 1 < i<xj (ᄊ― i+l) + H b (8i—8 , 8/-1), j < b t ;
else if i = x, j (b x _i+l) + 仏 (&c— 8 , 8x— 1), j <b x .
else if Random
j <— random[b i-2 H -\-l , わ J , where human remembers a random value
Generate slave key d s :
(1) Do if ID = URL = NULL, ^ SHA-512(J , j) ;
else if ID = NULL, Hi SHA-512(J II URL , f) ;
else if URL = NULL, Hi SHA-512(J IIID,j) ;
else if ID and URL are not NULL, Hi SHA-512(J II ID II URL J).
(2) H Hi(0 , 255), n-bit truncation of Hi from MSB bit, where n = 256
(3) d s ᅳ— Bin2Txt{ n-bit CSPRBG (H) ), Bin2Txt = Binary-to-text encoding
N レ
Apply the slave key d s . Then, clear the memory storing all forms
of secrets and close all the application software.
Figure 7.2 Operation of the basic model of multihash key method and system
120
예 505
Necessary entries are master key d and numeric 4-digit passcode d^- Optional
entries are username ID and website (or domain name) URL. The username and
website are used to create diversity of multihash key from a key pair (master key,
passcode). Domain name can also help to resist phishing and spoofing attacks.
The 512-bit hash of the concatenated master key and passcode is truncated
into 20 partitions with 8-bit each from the MSB bit. This increases the randomness of
specific keys for different accounts. If an attacker does not know the exact security,
then 5120 hashes have to be checked for any key pair (master key, passcode). If the
attacker knows about the security level, then 28 hashes have to be validated for any
key pair (master key, passcode).
For the settings of bound &/, it can be either fixed or random. If the fixed
option is chosen, the number or hash iterations will use the standard settings. A user
is mobile and can use this method without remembering the number of hash
iterations while accessing offline and online login account from different computing
systems.
If the random option is chosen, the number of hash iterations will be
randomly selected by a user within a given range. User's mobility is weakened
unless one can remember the random values of hash iterations while accessing
offline and online logins. However, if a user can remember the hash iterations, this
option offers stronger resistance to dictionary attack. The best option is a hybrid
scheme. Choose fixed option for lower security levels and random option for higher
security levels.
Depending on the value existence of username ID and domain URL, the
master key undergoes different key hashing and key strengthening using SHA-512 to
generate hash Hi. Hi is then encoded from Dinary to text to fulfil the demands of
password requirements such as alphanumeric, mixed lowercase and uppercase, and
with punctuation marks.
Here, a binary-to-text encoding of Bin2Txt(H) is proposed as in Table 7.1.
Base64 encoding is not used as there are only two punctuation marks included
(Borenstein & Freed, 1992). Bin2Txt(H) converts 6 binary bits into one 8-bit ASCII
121
character. It has a bit expansion of 33%. All types of ASCII characters are included:
lowercase, uppercase, digit, and punctuation marks. The last group of 4 binary bits of
H from 253rd to 256th is padded with 2 binary bits of at the right or LSB side. The
output of Bin2Txt(H) is a string of 43 ASCII characters and is used as key hash.
Table 7.1 Binary-to-text encoding Bin2Txt(H) of multihash key
Bin
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
Txt
a
b
c
d
e
f
g
h
i
j
k
1
m
n
P
Bin
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Txt
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Bin
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
Txt
1
2
3
4
5
6
7
8
9
<
>
?
Bin
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Txt
I
#
$
%
&
(
)
*
+
1
@
Bin
Padding
Txt
N.B.: Bin: For easy understanding, decimal value is shown to represent Dinary values
Lastly, copy the hash as site key into the clipboard and paste it on the prompt
key field for authentication access. Remember to clear the clipboard before
leaving the computer.
On how to change from an old key into a new one, a user can change either
the master key, passcode, security level, username, or the domain name. There are
also proposed usages of 20 security levels as shown in Figure 7.3.
New methods and systems called multihash key and its variants are presented
here to generate multiple slave keys (aka site keys) from a single master key for both
the offline and online accounts. Among various cryptographic, information- hiding,
and non-cryptographic applications needing secrets for various types of key, here are
122
some of the popular applications of secret key: (i) Master key for password vault
hiding various keys; (ii) Internet banking; (iii) online stock trading; (iv) insurance; (v)
tax; (vi) office, school and home email accounts; (vii) instant messengers; (viii)
encrypted files; (ix) database accounts at the office and school; (x) library accounts;
and (xi) verification key for credit card. Hence, the impact contribution of multihash
key shall be very high in the aspects of reducing the human memorization burden
and system operating costs.
The multihash key method and system uses the hash iteration and hash
truncation, followed by optional /i-bit CSPRBG to increase the randomness, as for a
basic model of multihash key as in Figure 7.2, to generate slaves keys from a master
key and an optional passcode. The master key and hash function shall be at least 2n
bits. The passcode shall be at least 4 digits or more. The hash iteration applies the
key strengthening for a period ranging from 0.2 to 2 seconds, or longer to 10 seconds
in some of the variants of multihash key. Hash truncation halves the hash value or
message digest. Multihash key supports infinite number of online accounts and
limited number of offline accounts depending on the performance of the computer.
Examples of online accounts are webmail, login, email, and instant messenger.
Examples of offline accounts are encrypted file, public-key certificate, bank ATM
card, and software token.
Security levels: usages
1 Password file and key management tool like password vault.
2 Finance=>Very important Internet banking.
3 Finance=>Important Internet banking.
4 Finance=>Stock trading.
5 Finance=>Insurance, income tax, ...
6 Very important personal encrypted files, email accounts, instant messengers.
7 Important personal encrypted files, email accounts, instant messengers, ...
8 Very important accounts in working/ studying place like email.
9 Important accounts in working/ studying place like database.
10 Other accounts in working/ studying place like library.
1 1 〜; 20 Other not frequently used offline and online accounts.
Figure 7.3 Proposed usages of 20 security levels
123
Table 7.2 Comparisons of key management tools
Feature s\Key management tools
Plain
browser
Password Password Windows
LPWA
HP site
CPG
Password
SPP
Pwd
Hash
Passpet
Multihash
key
saie
live i ᄂ/
password
multiplier
Usability
1. Make logging in more convenient
No
Yes
No
Yes
Yes
No
?
Yes
?
No
Yes
?
2. Work with existing websites
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
3. Allow site -by -site migration to
tool
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
4. Change individual site keys
Yes
Yes
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
5. Log in from other computers
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
6. Only need to memorize one secret
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
7. Enable changing the master secret
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
8. Applicability to offline accounts
Yes
No
No
No
No
No
No
No
No
Yes
9. Applicability to online accounts
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
10. Integrate usages together with
other tools
Yes
No
No
Yes
No
No
No
No
No
Yes
Security
1 ᅳ Unique key for each account
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
2. Resist offline dictionary attacks
No
No
No
No
No
No
No
Yes
No
No
Yes
Yes
3. Adapt to increasing CPU power
No
No
No
No
No
No
No
Yes
No
No
Yes
Yes
4. Avoid storing keys
Yes
No
No
No
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
5. Avoid a single central authority
Yes
Yes
Yes
No
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
o. Resist phi shin g by fake login
forms
No
No
No
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
7. Resist mimicry of browser UI
No
No
No
No
No
No
No
No
No
No
Yes
No
8. Help the user identify websites
No
No
No
No
No
No
No
No
No
No
Yes
No
9. Stop entering secrets in webpages
No
No
No
No
No
Yes
?
Yes
?
No
Yes
?
Possible implementation
1 ᅳ Stand-alone application
No
No
Yes
No
No
Yes
No
Yes
Yes
Yes
No
Yes
2. Single sign-on server
No
No
No
Yes
Yes
No
Yes
No
No
No
No
No
3 ᅳ Browser extension
Yes
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
?: Unknown situation depending on implementation
7.2.4 Discussions
Table 7.2 compares various key management tools with multihash key from
the aspects of usability, security, and possible implementation. A lot of comparisons
are attributed by Yee and Sitaker (2006) on Passpet. New features used for
comparisons are applicability to offline and online accounts, integrated usages
together with other key management tools and possible implementations. It is
124
important to note here that multihash key can be used together with Passpet to earn
"Yes" for items [L7-L9] under the security features in Table 7.2.
Multihash key can be used for both offline and online accounts. Possible
implementations are stand-alone application and browser extension. These are simple
interfaces to input a password or key with unique key images for multiple accounts.
Memorizability is improved since there is only one secret for various login accounts.
Server is not used and hence there is no central authority. There are no single
point of failure and high cost of integration. It is mobile and there is no encrypted
storage of site keys. Since there is no integration, multihash key can be used for any
existing computer systems.
The passcode is optional to be remembered by a user because it can be
converted to be an 8-bit password supplement in one of the two methods of key
strengthening (Manber, 1996; Abadi, Lomas & Needham, 1997, 2000). Master key is
the password, and when it is combined with the password supplement, they form the
full password. Another key strengthening method is also called key stretching, which
uses a large amount of hash iterations (Kelsey, Schneier, Hall & Wagner, 1997).
The variant of SHA-2, which is SHA-512, is used in the key hashing and key
strengthening. This is because there are possible collision attacks to MD5 and SHA-1.
The hash truncation creates a 256-bit hash as site key. The unused truncated bit
creates a 128-bit security strength (256/2=128) preventing the compromised site keys
at the higher security level from revealing the site keys at the lower security level.
The passcode also has this feature but is very much less powerful.
For the experimental data of lower bound b L and upper bound bu of some
computer systems, there are reported as follows. For instance, for the first computer
system of desktop PC [Example 1: Pentium II 266MHz, 192MB RAM, running on
Windows XP Professional Edition], the lower and upper bounds for 1 -second hash
iteration, as in Figure 7.1, are 7600 and 8200, respectively. In other words, the first
computer system can only support 20 offline accounts for a security level
partitioning of 8 bits or 2 8 .
Yet in the second computer system of laptop PC [Example 2: Centrino Duo
1.66GHz, 1.5GB RAM, running on Windows XP Home Edition], the lower and
125
upper bounds for 1 -second hash iteration are 81,700 and 93,700 respectively. For this
specification, the second computer system can support 256 offline accounts for a
security level partitioning of 8 bits or 2 8 .
Yet in the third computer system of desktop PC [Example 3: Pentium D
2.80GHz, 512MB RAM, running on Windows XP Professional Edition SP3], the
lower and upper bounds for 1 -second hash iteration are 52,500 and 122,500
respectively. For this specification, the third computer system can support 256 offline
accounts for a security level partitioning of 8 bits or 2 8 .
Using the proposed settings, the key strengthening has an access time from
0.2 second to 2 seconds. This is an efficient range of acceptable login processing
time. It can be calibrated to be parallel with the advances in computer technologies
for new releases of multihash key. Moore's Law is a good rule to judge the
calibration, which is about one bit faster for every two years (Wikipedia, 2008v).
Key hashing and key strengthening are also good techniques to resist offline
and online dictionary attacks as well as pre-computation attacks. To prevent phishing
and spoofing attacks, multihash key can either be used together with other anti-
phising tool like petname system and Passpet, or include domain name URL in its
key hashing. Malicious server attack is also prevented as different accounts have
unique passwords. For homograph attack due to visually similar Unicode graphic
symbols, the implementation of multihash key shall support the Unicode characters.
Up to here, the basic model of multihash key can support infinite number of
online account. Meanwhile, the number of supported offline account by multihash
key is given by Equation (7.1). From Figure 7.2, the security level x can be increased
up to the maximum of hash iteration number ゾ max . Also, hash functions beyond 512
bits like 768 and 1024 bits may be needed.
Saco = X (7.1)
7.2.5 Limitations
Multihash key can be implemented as a stand-alone application with no
change of setting at the server side. However, it is vulnerable to password file
126
compromise attacks and message log file attacks. Nevertheless, domino effect of
password reuse can be avoided. To get rid of password file compromise attacks and
message log file attacks, some countermeasures (Gouda, Liu, Leung & Alam, 2005)
can be adopted by changing the settings of authentication approach at client and
server sides.
Acting as a stand-alone application, multihash key requires a user to perform
extra steps. These steps are creating a key, copying, and pasting it to a login
prompted textbox. The user also needs to remember the security level of an account,
an at least 128-bit master key, and a numeric 4-digit passcode. These cause the
solution to be not user-rnendly.
To facilitate the application, multihash key has to be integrated into the user
interface of each authentication application. Therefore, the item [LI] of usability in
Table 7.2 about convenient logging in depends on implementation.
For security level, it can be jotted into a notebook in plaintext form because it
is not an essential secret. Alternatively, for online account, the user can be reminded
about the security level whenever the user sends the username to the server. This
allows an attacker to reduce the number of hash testing by 20 times, or 4.32 bits
(=log 2 20).
For numeric 4-digit passcode, it gives an extra security of 13.29 bits
(=log 2 10 000) and is not an essential secret. This passcode can be made constant for
user with poor memory. For user who can remember 128-bit master key, 4-digit
passcode and security level, the effective security strength is 145.01 bits. For user
who can remember only the 128-bit master key, its security strength is 128 bits.
Hence, security can be compensated for better usability.
Using multihash key, limited number of multiple offline and online accounts
can be supported as compared to the almost infinite number of online accounts for
LPWA, HP Site Password, CPG, Password Multi-plier, SPP, PwdHash, and Passpet.
For more accounts, faster computer system is needed to have larger bound range. Or
else, the partition between any two security levels has to be reduced.
127
7.2.6 Conclusion
The proposed invention of multihash key requires users to remember a master
key and passcode to generate unique key hashes or site keys for multiple accounts.
For security level, username, and domain name of a specific account, users can
choose to write them down somewhere as there are not critical secrets. This is a
balance between the usability and security.
Multihash key can be used for offline and online accounts, where existing
similar key management tools without encrypted site key storage can only be applied
to online accounts. It is hoped that this proposal can release the human memory
burden on required passwords or keys for various types of increasing accounts. To
have better resistance to phishing and spoofing attacks, try to use multihash key
together with an anti-phishing tool like petname system and Passpet.
7.3 More Slave Keys for Offline Accounts per Master Key of Multihash Key
Key hashing of master key and domain name generates site keys for online
account only like login. Meanwhile, multihash key using hash truncation can be
applied for both online account and offline account like password encryption of
electronic file using symmetric key cryptography and partial memorizable private
key of the asymmetric key cryptography. Nevertheless, even though infinite online
account can be supported by multihash key, only limited offline account is possible.
The current computer speed limits it to 20 offline accounts unless we have faster
computer system, reduced partition length, or more passcodes.
Here, three methods are proposed to support more offline accounts per master
key of multihash key using filename, random number, or two -tier structure.
Multihash key using a random number can now have up to 2 256 site keys for
electronic file of offline account. Meanwhile, multihash key using a two -tier
structure can support multiple partial memorizable private keys of the split private
key cryptography up to 400 offline site keys.
To support more offline accounts, especially the various cryptographic
schemes of MePKC, multihash key is further enhanced. Firstly, hashing the
128
concatenation of a master key and a filename is proposed as in Figure 7.4a. As long
as the filename is unique, infinite offline accounts can be supported. However, the
problem is name clashing and renaming.
Secondly, a random number is used without and with multihash key,
respectively, as in Figures 7.4b-7.4c, where this random number is concatenated with
master key in a hashing process to generate a slave key. For a ciphertext encrypted
using this slave key, the random number has to be retrieved first. Hence, this random
number is encrypted using the master key and stored as a concatenation to a file
ciphertext encrypted by the slave key to become an output file. When a user wants to
open the file ciphertext, one splits the output file to get the ciphertexts of file and
random number. Decrypt the ciphertext of random number using the master key.
Then, generate the slave key using the master key and the recovered random number.
Subsequently, the file ciphertext is decrypted by the slave key. Using AES-256, this
method using a random number can support 2 256 offline accounts. However, its
drawbacks are major modification to the current computer systems and no support
for secrets of offline accounts without any ciphertext storage, such as split private
key crypto system and MePKC.
Then, a third method, as in Figure 7.4d, using a two-tier structure of
multihash key is proposed. For the examples of the first and second computer
systems, 400 and 65536 offline accounts, respectively, can be supported. This
method is compatible with the current computer system. Yet the special advantage of
this method is its support for secrets of offline accounts without any ciphertext
storage. In other words, the partially and fully memorizable private keys of split
private key crypto system and MePKC can now be supported.
1600
Using Filename
P = plaintext, Km = master key, F
= file name, Ks = slave key, Ci = file ciphertext,
Encryption
Decryption
K s Hash (K M II F)
K s Hash (K M II F)
Ci ― Encrypt (P , Ks)
P Decrypt (Ci , Ks)
Figure 7.4a rirst method: Using filename
129
1601
Using Random Number without Multihash Key
P = plaintext, Km = master key, R = random number, Ks = slave key,
Cr = R ciphertext, Ci = file ciphertext, C2
= output file,
Truncation = n-bit truncation, j = hash iteration number
Encryption
Decryption
K s ― Truncation ( Hash (K M II R) )
[C R , Ci] ᅳ Truncation(C 2 )
Ci ᅳ Encrypt (P , Ks)
R Decrypt (C R , K M )
Cr <— Encrypt (R , K M )
K s Truncation ( Hash (K M II R) )
C 2 ᅳ (Cr II CO
P Decrypt (Q , Ks)
Figure 7.4b Second method: Using random number without multihash key
1602
Using Random Number with Multihash Key
Encryption
Decryption
K s ― Truncation ( Hash (K M II R J) )
[C R , Ci] ᅳ Truncation (C 2 )
Ci ― Encrypt (P, Ks)
R Decrypt (C R , K M )
Cr <— Encrypt (R, K M )
K s Truncation ( Hash (K M II R J) )
C 2 ― (Cr II d)
P Decrypt (Ci , Ks)
Figure 7.4c Second method: Using random number with multihash key
1603
Using Two-Tier Structure of Multihash Key
Settings: Multihash = multihash key function, Km = master key, Kn =
passcode K S i = first slave key, Ks 2 = second slave key, j\ = first hash
iteration number, 72 = second hash iteration number, Ks = final slave key
for various offline accounts
(1) Ksi ᅳ Multihash ( K M , K N ,力 )
(2) Ks2 ᅳ Multihash ( Ksi , K N J 2 )
(3) Stored in notebook (j\ ,j 2 )
(4) K s ― K S2
Figure 7.4d Third method: Using two-tier structure of multihash key with manually
selected security levels
Figure 7.4 Methods and systems to support more offline accounts for multihash key
130
7.3.1 Related Works
In the information era, human has many keys or passwords for various offline
and online accounts. On 4 February 2001, Kanaley (2001) with Forrester Research
reported that an active Internet user averagely manages 15 keys on a daily basis. On
the other hand, Adams and Sasse (1999) reported that a user can only be expected to
cope with 4 to 5 keys that were unrelated and regularly used. For user's unique keys
without the constraint of relevancy, Florencio and Herley's survey (2007) reported
an average 6.5 keys, repeated 3.9 times each for 25 accounts and typing 8 keys daily.
This reflects a demand to enhance human memorizability to support many accounts
needing a key. Online account is like email and webpage login. Offline account is
like file encryption, encrypted private key, and memorizable private key of MePKC.
Key hashing of master key and domain name (or server name) is used to
generate site keys for online accounts (Gabber, Gibbons, Matias & Mayer, 1997;
Karp, 2003; Karp & Poe, 2004; Halderman, Waters & Felten, 2005; Gouda, Liu,
Leung & Alam, 2005; Ross, Jackson, Miyake, Boneh & Mitchell, 2005; Yee &
Sitaker, 2006). Other methods of single master key for multiple online site keys are
single sign-on server (Windows Live ID, No date) and CPG (Common Password
Method) using website account with assigned random number (Luo & Henry, 2003).
Meanwhile, multihash key (Lee & Ewe, 2007a) using key strengthening and
hash truncation can be applied for both online account and offline account.
Nevertheless, even though infinite online account can be supported by multihash key,
only limited offline account is possible. The current computer performance limits it
to 20 offline accounts unless the computer system is faster or reduced the partition
length between the two security levels.
However, the computer speed increases by 1 bit for every 24 months. It is not
surprising where one may have a few hundreds of accounts up to 512. We may need
to wait for 10 years if computer speed is expected to increase the supported offline
account. For the reduction of partition length, it decreases the attacking time because
the security level of those account holders with poor memory is public. The current
partition length at 2 8 is already considered short. It is not encouraged to be shorter.
131
Instead, the better approach is to increase the partition length in order to increase the
attacking time whenever the security level is known.
Hence, the only current possible practical way to have over 20 offline
accounts is to change the passcode (Lee & Ewe, 2007a). However, this method is not
appropriate for those with poor memory. Moreover, the increment of offline account
is additive, which means an increment of 20 offline accounts for every additional
passcode. Here, three methods for multihash key are proposed to support more
offline accounts using filename, random number, or two -tier structure.
7.3.2 First Method: Using Filename
Domain name or server name is commonly used to generate infinite slave
keys (aka site keys) for online ac-counts from a master key (Gabber, Gibbons, Matias
& Mayer, 1997; Karp, 2003; Karp & Poe, 2004; Halderman, Waters & Felten, 2005;
Gouda, Liu, Leung & Alam, 2005; Ross, Jackson, Miyake, Boneh & Mitchell, 2005;
Yee & Sitaker, 2006). The general equation is in Equation (7.2).
Slave Key = Hash (Master Key II Domain Name) (7.2)
For offline account like file encryption and encrypted private key, a tagged
filename informs that no change can be made. Then, Equation (7.3) can be used to
support over 20 offline accounts, where filename replaces the domain name. This
method using filename is shown in Figure 7.4a.
Slave Key = Hash (Master Key II Filename) (7.3)
As long as the filename is different, infinite offline account can be supported.
The disadvantage of this method is that the computer file system has to be
restructured so that there is an option to ban the change of filename. Having another
file to hint that a specific filename of a file cannot be changed may have problem
because a user may forget to transfer and store these two files together.
132
Another problem is that due to different computer operating systems, the
filename with some special characters like space mark and some punctuation marks
tends to change automatically when it is transferred and saved from one computer to
another computer.
Thirdly, for non- ASCII multilingual filename like CJK filename, it may have
problem as well when the file is transferred and saved among different computing
systems. For encrypted private key in the form of smartcard, there exists the problem
that no filename is available. Consequently, this method using filename can only be
conditionally implemented independent of or together with multihash key.
7.3.3 Second Method: Using a Random Number
CPG (Luo & Henry, 2003) assigned a random number for every website
account and storea it in a server to generate unique site keys for different online
accounts. It is not designed for offline account at all. Here, a new algorithm is
designed using random number as well to support over 20 offline accounts up to the
set size of the random number. This new algorithm can be implemented independent
of or together with multihash key. Figure 7.4b shows an independent implementation
from multihash key; whereas Figure 7.4c shows an implementation together with
multihash key.
Let P = file plaintext, R = random number, Km = master key, Ks = slave key,
Cr = ciphertext of R, Ci = file ciphertext, C2 = output, Hash(X II Y) = hashing the
concatenation of X and Y for one round, Hash(X \\Y ,b) = hashing the concatenation
of X and Y for b round, Enc = encryption, Dec = decryption, Trunc = truncation, II =
concatenation, and B(x) = bit length of x. Equation (7.4) is the setting.
B(K S ) = B(K M ), B(Hash) > 3B(K M ), B(R) < B(Hash) - B(K M ) (7.4)
For security analysis of both the algorithms using random number in Figures
7.4b-7.4c, an attacker will try to recover the random number R and file plaintext P.
The ciphertext of random number Cr cannot be cryptanalyzed as long as it is random,
which means there is no loophole in the pseudorandom number generator (PRNG).
133
Another condition for the random number R is that its bit length is maximized as in
Equation (7.3) with promising random number generation speed.
When the cryptanalysis of Cr is impossible, the only attacking place is the
cryptanalysis of file ciphertext Ci. Ci can be obtained easily because the truncation
function of C2 to get Cr and Ci is public. For algorithm in Figure 7.4b independent
of multihash key, guessing attack and pre-computation attack are possible and take
less computing efforts than the algorithm in Figure 7.4c. This is because the pre-
computation attack over the algorithm in Figure 7.4b requires only one round of
hashing to generate the slave key Ks. Meanwhile, algorithm with multihash key in
Figure 7.4c requires many rounds of hashing. The extra security strength of Figure
7.4c algorithm from Figure 7.4b algorithm is because of the key strengthening
(Manber, 1996; Abadi, Lomas & Needham, 1997, 2000; Kelsey, Schneier, Hall &
Wagner, 1997). Key strengthening, which is also called key stretching, is a process to
hash an input value for many rounds until a response time of about 1 second.
The hash truncation in both Figures 7.4b-7.4c introduces more difficulty to
get master key Km from compromised Ks. If an attacker can recover P and Ks from
Cr, it is still very hard for him to recover Km. Whenever the Km is not compromised,
the compromise of a single offline account will not affect the other offline accounts.
Of course, the security of the hash function is also very important. The security
strength of a hash function is half of its bit length. In case of compromised Ks,
B(Hash) has to be at least triple of B(K M ) as in Equation (7.3). For instance, if SHA-
384 is used, the K M , Ks, and system security strength are all 128 bits. For hash
function longer than 512 bits, a developer can refer to scalable polymorphic hash
(Roellgen, No date, 2005).
For computation load of algorithm in Figure 7.4b, it runs faster than
algorithm in Figure 7.4c. However tms faster speed is not good because it also means
faster possiole cryptanalysis. Figure 7.4c algorithm runs slower but it has acceptable
response time with key strengthening set at about 1 second. The delay of response
time is significant as it also freezes the requirement of longer key size as the
computer technologies are advancing. The number of hash iteration can be simply
increased to maintain a response time at about 1 second. For random number
134
generation, Le Quere (2004) invented a fast RNG with 100 Mbps. Its drawback is
that a special physical RNG is needed. Another alternative without special hardware
is a PRNG based on discrete logarithm problem by Gennaro (2005) with 860 bits per
160-bit exponent exponentiation when typical parameters are n = B(modulo prime) =
1024 and c = B(exponent) = 160.
The first weakness of this method using random number is that it cannot be
implemented on the current encryption system. Only new encryption system with
updated software program and hardware device can adopt it. Also, for some special
cases where there is no ciphertext, the ciphertext of a random number has no place to
be stored. This happens to the private key storage technology like split private key
(Sandhu, deSa & Ganesan, 2005c, 2006c, 2006f). Different asymmetric key pairs
may be needed for different purposes like encryption, digital signature, key exchange,
authentication, digital timestamping, and multipartite public key cryptography for
electronic commerce.
7.3.4 Third Method: Using a Two-Tier Structure
The third method is proposed to get rid of the disadvantages of the second
method. It can only be used together with multihash key. For the mean time, the
increment of supported offline account is additive with extra 20 site keys for every
additional passcode. Here, the increment of the slave keys for offline accounts can be
made to be multiplicative by having a two-tier structure.
For this two -tier multihash key, there are two rounds of multihash key. The
slave key from the first round of the multihash key (intermediate site key) will
become the master key of the second round of the multihash key (intermediate
master key). The slave key from the second round of the multihash key (final slave
key) will be used for the offline account like rile encryption and private key.
Subsequently, there are 20*20 = 400 site keys for offline accounts. This will
be sufficient for the current usage demand of asymmetric key pair. In case it is not
enough, the two-tier structure can become three-tier structure or higher order. In case
it is a three-tier multihash key, there are 20*20*20 = 8000 site keys for offline
accounts. Figure 7.4d shows a two -tier multihash key.
135
For this method, there exists a problem to remember the combination of
security level. A user may need to save this combination somewhere in a paper
notebook or encrypted electronic file. Consequently, portability is a weakness in case
the notebook is not around. However, its advantages are support to old encryption
system and applicability to offline account without ciphertext storage like the
memorizable partial private key of split private key technology (Sandhu, deSa &
Ganesan, 2005c, 2006c, 2006f) and fully memorizable private key of MePKC.
7.3.5 Conclusion
Three methods to increase the number of slave keys for offline accounts have
been proposed: Using a filename, random number, and two -tier structure. The first
method is the simplest, but has impractical implementation conditions. The second
method is good for new file encryption system with ciphertext storage.
Complementanly with the second method, the third method can be used for old and
new file encryption system without ciphertext storage. In a nutshell, human needs
memorizability enhancement like multihash key to have various slave keys from a
master key for both the offline and online accounts.
The software implementations (Lee, 2007a, 2008i, 2008k) of the multihash
key have been built up by using the Microsoft Visual Studio (Marshall, 2003) and
can be evaluated by downloading a copy of this software from [URL:
www.xpreeli.com].
7.4 First Variant of Multihash Key Using Automatically Selected Tiers and
Security Levels
Besides the basic model, multihash key has been innovated to have some
variants. The first variant in Figure 7.5 supports more offline accounts by using
automatically selected tiers and security levels.
Box 1701 gives the settings to create various slave keys d s (aka site keys) of
multihash key. Necessary entries are master key d, numeric y-digit passcode d n ,
where y can be 4, and sequence ID Q.
136
1700
V
Settings to create various slave keys d s (aka site keys) of multihash key:
(1) Necessary entries: Master key d, numeric y-digit passcode d n , sequence ID Q
(2) Optional entries: Username ID, domain name URL, or else NULL
(3) Bounds of hash iteration for various security levels s,- : b u b 2 , b 3 , b!, . . ., b x
(4) (d II d n II Q) selects security level Si among x security levels, where x = 32
(5) Use 2/i-bit hash function where 2n> 512 like SHA-512
(6) H h (z.\ , z?) = bit truncation of H h from bit zi to bit z?
1701
Processing keys d, d m and Q to create determinants H b of hash iteration number j t
within their bounds and security levels i = x t for each tier of multihash key, and
then calculate the hash iteration number j t and security level x t of each tier t :
(1) for ? = to m, where m = 9 or other values,
H b <— SHA-512 (d II d n \\Q, 1) for one round of hash iteration ;
x t // fo (8x+?log 2 x , 8x+ (? +l)log 2 ^;-l) = H b {^x+5t , 8x+5?+4) ;
iH=l, h-
else if 1 < j < x, j,
else h i = x, j,
ゅ广2 8 +1) + / も (0,7), j t < b x ;
(fon+l) + H b (8i—8 , 8/-1), j t < h ;
+ H b {%x-% , 8x-l), j, < b x ;
Generate intermediate slave keys H t for tier t :
if ID = URL = NULL, H it SHA-5 1 2(d , j t ) ;
else if ID = NULL, H it SHA-5 12(J II URL , j t ) ;
else if URL = NULL, H lt SHA-5 12(J II ID , j t ) ;
else if ID and URL are not NULL, H it SHA-5 12(J II ID II URL J t ) ;
d n ^H t ^ H it (0 , 255), n-bit truncation of H it from MSB bit ; 1;
Go to step (1) of Box 1702 whenever t<m. end
Generate slave key d s :
(1) User selects H 아 H m or H 아 SHA-5 12(// ᅵᅵ^ i II 표 II .. ᅳᅵᅵ 하 II ... II H m )
(2) d s Bin2Txt(n-bit CSPRBG (H(0 , 255))), Bin2Txt = Binary-to-text encoding
/ 싀
1703
Jot down Q or store Q at a local/remote server for future access.
Apply the slave key d s . Then, clear the memory storing all forms
of secrets and close all the application software.
1704
Figure 7.5 First variant of multihash key method and system to support more offline
accounts using automatically selected tiers and security levels
137
Sequence ID Q can be in plaintext and is used to create multiple unique
offline and online slave keys. Q can be jotted down into a notebook, or stored at local
and remote servers for future acknowledgment to the user about the Q value of one's
account. Optional entries are username ID, domain name URL, or else NULL.
Bounds of hash iteration for various security levels s, are b u b 2 , & 3, ..., H ..., b x .
Concatenation of (d II d n II Q) selects security level Si among x security levels, where
X = 20, 32 or others. This method uses 2/i-bit hash function, where 2/7 > 512 like
SHA-512. H b (z\ , zi) means bit truncation of H b from bit z\ to bit zi.
At Box 1702, master key d, passcode d n , and sequence ID Q are processed to
create the determinants Hb of hash iteration number j t within their bounds and
security levels i = x t for each tier of multihash key, and then calculate the hash
iteration number 요 and security level x t of each tier t. Here, an intermediate slave key
H t is derived at each tier and replaces the d n . Repeat step (1) in Box 1702 whenever
the maximum number of tier m has not been reached.
At Box 1703, final slave key d s is generated by directly taking the slave key
at the final tier or hashing the concatenation of derived secrets from each tier. At Box
1704, jot down Q or store Q at a remote server as like salt for future access, apply the
slave key d s , clear the memory storing all forms of secrets, and then close all the
application software. The passcode here can be optionally replaced by a big
memorizable secret for more randomness to support more offline accounts up to
Equation (7.5). Security level x can be increased up to the maximum of hash iteration
number j max . Also, hash functions beyond 512 bits like 768 and 1024 bits may be
needed.
Saci =x (7.5)
7.5 Second Variant of Multihash Key Using Automatically Selected
Permutation Sequence of Security Levels
The second variant in Figure 7.6 also supports more offline accounts by using
automatically selected permutation sequence of security levels.
138
1800
V
Settings to create various slave keys d s (aka site keys) of multihash key:
(1) Necessary entries: Master key d, numeric y-digit passcode d n , sequence ID Q
(2) Optional entries: Username ID, domain name URL, or else NULL
(3) Bounds of hash iteration for various security levels s, : b u b 2 , b 3 , . . ., b x
(4) (d II d n II Q) selects security level s t among x security levels, where x = 32
(5) Use 2n-bit hash function where 2n> 512 like SHA-512
V
Processing keys d, d m and Q to create determinants H b of hash iteration number j,-
within their bounds and permutation number pq (= p q ) to select a security level i :
(1) H b SHA-512 (d II 4 II Q , 1) for one round of hash iteration
(2) H b (z\ , Zi) = bit truncation of H b from bit zi to bit zi
V
Calculate the hash iteration number j,- for each security level i :
(1) for i = 1 tox,
if i = 1, ji 수— {b x -2\\) + H b (0 , 7), j'- < b x ;
else if 1 < / < xjt ᅳ (^! +1) + 仏 (8Z— 8 , 8/-1), j t < b { ;
else if i = x, j,- <— (b x _i+l) + //わ (8 ぶ— 8 , 8x-l), j,- < b x . end
V
Generate intermediate slave keys H} for i=\to x and then slave key d s :
(1) for i = 1 tox,
if ID = URL = NULL, H u SHA-5 1 2(d , j ( ) ;
else if ID = NULL, H u SHA-512(J II URL , j" ) ;
else if URL = NULL, H u SHA-512(J II ID Jd ;
else if ID and URL are not NULL, H u SHA-512(J II ID II URL Jd ;
Hi H u (0 , 255), n-bit truncation ofH u from MSB bit . end
(2) Generate the permutation number pq (= p q ) for some selected Hi :
for ひ = 1 to floor(n/log 2 x), where floor(n/log 2 x) = 51,
M 수 Pq ᅳᅳ ^(8x+(^-l)log 2 x, 8x+^log 2 x-l) = H b (^x+5q-5, 8 ズ +5^—1).
(3) H ᅳ SHA-512^! II H p2 II H p3 II ... II / 뇨 II . . . II H p5l )
(4) d s Bin2Txt(n-bit CSPRBG (H(0 , 255))), Bin2Txt = Binary-to-text encoding
V
Jot down Q or store Q at a local/remote server for future access.
Apply the slave key d s . Then, clear the memory storing all forms
of secrets and close all the application software.
Figure 7.6 Second variant of multihash key method and system to support more
offline accounts using automatically selected permutation sequence of security levels
139
세 802
씨 803
〜顯
씨 805
Box 1801 gives the settings to create various slave keys d s (aka site keys) of
multihash key. Necessary entries are master key d, numeric y-digit passcode d n ,
where y can be 4, and sequence ID Q. Sequence ID Q can be in plaintext and is used
to create multiple unique offline and online slave keys. Q can be jotted down into a
notebook, or stored at local and remote servers for future acknowledgment to the
user about the Q value of one's account. Optional entries are username ID, domain
name URL, or else NULL. Bounds of hash iteration for various security levels S/ are
b\, & 2, & 3, ..., In, ..., b x . Concatenation of (d II d n II Q) selects security level s- t among x
security levels, where x = 20, 32 or others. This method uses 2n-bit hash function,
where In > 512 like SHA-512.
At Box 1802, master key d, passcode d n , and sequence ID Q are processed to
create the determinants Hb of hash iteration number ji within their bounds and
permutation number pq (= p q ) to select a security level i. H b (zi , zi) means bit
truncation of H b from bit z\ to bit zi. At Box 1803, calculate the hash iteration
number 7/ for each security level i.
At Box 1804, generate intermediate slave keys H L at each security level and
then slave key d s . To select H h permutation number p q is used. The final slave key is
the hashing of the concatenation of multiple Hi based on p q . There may be a special
permutation number meaning NULL value where no bitstream is concatenated. If all
the selected H t are NULL, then select another d n and repeat all the steps.
At Box 1805, jot down Q or store Q at a remote server as like salt for future
access, apply the slave key d s , clear the memory storing all forms of secrets, and then
close all the application software. Let T be the maximum number of concatenated Hi
based on p q . The passcode here can be optionally replaced by a big memorizable
secret for more randomness to support more offline accounts up to Equation (7.6).
Security level x can be increased up to the maximum of hash iteration number j max .
Also, hash functions beyond 512 bits like 768 and 1024 bits may be needed.
(7.6)
140
7.6 Third Variant of Multihash Key Using Hybrid Combination
The third variant in Figure 7.7 is a hybrid combination of the first and second
variants to support more offline accounts using a hybrid combination of
automatically selected tiers and security levels, and automatically selected
permutation sequence of security levels.
Firstly, do the operations in Box 1701. Then, at Box 1900, master key d,
passcode d n , and sequence ID Q are processed to create the determinants H b of hash
iteration number j t within their bounds, permutation number pq (= p q ) to select a
security level i, and security levels i for each tier t of multihash key. Here, calculate
the hash iteration number ji for each security level i at tier t. Generate first
intermediate slave keys Hu for / = 1 to x at tier t. Generate the permutation number
pq (= p q ) for some selected Hu at tier t. Generate second intermediate slave keys Hit
for tier t and replaces the d n . Repeat steps (1.0-1.4) in Box 1900 whenever the
maximum number of tier m has not been reached. There may be a special
permutation number meaning NULL value where no bitstream is concatenated. If all
the selected Hi are NULL, then select another d n and repeat all the steps.
At Box 1901, final slave key d s is generated by directly taking the slave key
at the final tier or hashing the concatenation of derived secrets from each tier. At Box
1902, jot down Q or store Q at a remote server as like salt for future access, apply the
slave key d s , clear the memory storing all forms of secrets, and then close all the
application software. Sequence ID Q can be in plaintext and is used to create
multiple unique offline and online slave keys. Q can be jotted down into a notebook,
or stored at local and remote servers for future acknowledgment to the user about the
Q value of one's account. Let T be the maximum number of concatenated Hu based
on pq. The passcode here can be optionally replaced by a big memorizable secret for
more randomness to support more offline accounts up to Equation (7.7). Security
level X can be increased up to the maximum of hash iteration number j max . Also, hash
functions beyond 512 bits like 768 and 1024 bits may be needed.
(y=T \ m
S A C3= Z x> (7.7)
V y= l J
141
From 1701
V
Processing keys d, d m and sequence ID Q to create determinants H b of hash
iteration number j,- within their bounds, permutation number pq (= p q ) to select a
security level i, and security levels i for each tier t of multihash key :
(1.0) for ? = to m, where m = 9 or other values,
H b SHA-512 (d II d n \\Q , 1) for one round of hash iteration ;
(1.1) Calculate the hasn iteration number j,- for each security level i at tier t :
for Z = 1 to x,
if i = 1, ji {b x -2\\) + H b (0 , 7), j'- < b x ;
else if 1 < / < xji (씌 +1) + H b (8i—8 , 8/-1), j) < b } ;
else if i = x, j) <— (b x _i+l) + //わ (8x— 8 , 8x— 1), j,- < b x . end
(1.2) Generate first intermediate slave keys H u for / = 1 to x at tier t :
for Z = 1 to x,
if ID = URL = NULL, H Ui SHA-512(J , j" ) ;
else if ID = NULL, H Ui SHA-512(J II URL ) ;
else if URL = NULL, H Ui SHA-512(J II ID , j ( ) ;
else if ID and URL are not NULL, H Ui SHA-512(J II ID II URL )
H u H Ui (0 , 255), n-bit truncation of H Ui from MSB bit . end
1900
(1.3) Generate the permutation number pq (= p q ) for some selected H u :
for な = 1 to floor(n/log 2 ぶ), where floor(n/log 2 x) = 51,
^ p q ^ Hb(^x+(q-l)log2X, 8x+^log 2 x-l) = H^x+5q-5, 8 ズ +5^—1).
(1.4) Generate second intermediate slave keys H 2l for tier t :
d n ^H 2! iSHA-512(H lpl II H lp2 II H lp3 II ... II H lpq II ... \\ H lp5l )U ^ t+U
Go to step (1.0) of Box 1900 whenever t<m . end
Generate slave key d s :
(1) User selects H^H 2m orH^ SHA-5 12(// 20 \\H 2l \\ H 22 II ... \\H 2t \\ ... II H 2m )
(2) d s Bin2Txt(n-bit CSPRBG (H(0 , 255))), Bin2Txt = Binary-to-text encoding
N レ
Jot down Q or store Q at a local/remote server for future access.
Apply the slave key d s . Then, clear the memory storing all forms
of secrets and close all the application software.
Figure 7.7 Third variant of multihash key method and system to support more offline
accounts using a hybrid combination of automatically selected tiers and security
levels, and automatically selected permutation sequence of security levels
세 901
142
7.7 Fourth Variant of Multihash Key as a Further Authentication Factor
For the fourth variant in Figure 7.8, it is a specific application of multihash
key to act as a further authentication factor in the Internet banking, online share
trading, or other situations.
At Box 2001, bank and user apply a key exchange protocol to establish a
shared master key d, optional passcode d n , and initial downcount/upcount number N
for hash iteration in multihash key. Set N = N c initially. At Box 2002 for Internet
banking transaction needing a second authentication factor, it is triggered by a user
requesting for execution of a transaction that needs further authentication. Bank
server then sends a first message with random value R, timestamp T, current
downcount/upcount number N c to the remote user in a secure channel like SSL.
At Box 2003 for user response to the bank's challenge, user uses the
downcount/upcount number N c as the hash iteration number of a multihash key
process to generate a slave key d s \ from master key d and pin d n . Then, user uses the
slave key d s \ to encrypt the first message to create a second message using symmetric
key cipher. Later, user sends the second message as response to the bank server in a
secure channel like SSL for further authentication.
At Box 2004 for verification of user's response by bank server, bank uses the
downcount/upcount number N c as the hash iteration number of a multihash key
process to generate a slave key d S 2 from shared keys d and d n . Then, bank decrypts
the second message using slave key d S 2 to get a third message. If the first message
and third message are identical, then the user is verified and authenticated for further
user- selected transaction. Otherwise if the first message and third message are not
identical, then the user is rejected for further user- selected transaction. If the user is
verified for further authentication, decrement the N c by one unit for downcount, or
increment the N c by one unit for upcount. If the user is rejected for further
authentication, user chooses to go to step (1) in Box 2002 for re-try or go to Box
2005 for exit. For re-try or new request for further authentication, go to step (1) in
Box 2002. Otherwise, go to Box 2003 to clear the memory storing all forms of
secrets and close all the application software.
143
2000
\レ
Bank and user apply a key exchange protocol to establish a shared master key d,
optional passcode d m and initial downcount/upcount number N for hash iteration
in multihash key. Set N = N C initially.
\
f
Internet banking transaction needing a second authentication factor:
(1) User requests for execution of a transaction that needs further authentication
(2) Bank server sends a first message with random value R, timestamp T, current
downcount/upcount number N c to the remote user in a secure channel like SSL
、
f
User response to the bank's challenge:
(1) User uses the downcount/upcount number N c as the hash iteration number of a
multihash key process to generate a slave key d sX from master key d and pin d n
(2) User uses the slave key d s \ to encrypt the first message to create a second
message using symmetric key cipher
(3) User sends the second message as response to the bank server in a secure
channel like SSL for further authentication
V
Verification of user's response by bank server:
(1) Bank uses the downcount/upcount number N c as the hash iteration number of
a multihash key process to generate a slave key d s2 from shared keys d and d n
(2) Bank decrypts the second message using slave key d s2 to get a third message
(3) If the first message and third message are identical, then the user is verified
and authenticated for further user-selected transaction
(4) Otherwise if the first message and third message are not identical, then the
user is rejected for further user-selected transaction
(5) If the user is verified for further authentication, N c <— N c - I or N c <— N c + I
(6) If the user is rejected for further authentication, user chooses to go to step (1)
in Box 2002 for re-try or go to Box 2005 for exit
(7) Re-try or new request for further authentication?
No
Clear the memory storing all forms of secrets and close all the
application software.
2001
2002
2003
2004
/XT'
2005
Figure 7.8 Fourth variant of multihash key method and system for the specific
application to act as a further authentication factor in the Internet banking or other
situations
144
7.8 Fifth Variant of Multihash Key as a Simple Key Escrow Method and
System
The fifth variant in Figure 7.9 is another specific application of multihash key,
where it acts as a simple key escrow method and system for supervisor-wise non-
critical secrets.
Simple Key Escrow Method and System Using Key Management of Multihash
Key for Supervisor-wise Non-critical Secrets
Kgm = grandmaster key, SID = stafr identity number, Y = current year,
K S m = staff master key, Ks S = staff slave key, CID = client identity number,
EID = event identity number, Kcs = client slave key,
Multihash = multihash key function as in Figures 7.2, 7.5-7.7.
Generation of Staff Slave Keys Generation of Client Slave Keys
Supervisor holds key K GM Ks M Kss
Kss Multihash ( Kg M II SID II EID II Y) Kcs 아 Multihash ( Ks M II CID II EID II Y )
Both supervisor and staff know key Kss. Both staff and client know key Kcs.
Key Escrow
Slave keys and master keys at a lower key management levels are known to people
holding master keys and grandmaster keys, respectively, at a higher management
level.
Figure 7.9 Fifth variant of multihash key method and system for the specific
application to act as a simple key escrow method and system for supervisor-wise
non-critical secrets
Key management of multihash key is applied here. Slave keys and master
keys at a lower key management levels are known to people holding master keys and
grandmaster keys, respectively, at a higher management level. For the generation of
staff slave keys, a supervisor holding grandmaster key Kgm uses the stafr identity
number SID, event identity number EID, and current year Y, to generate staff slave
keys Kss from multihash key for different applications, where Kss Multihash
( Kgm II SID II EID II Y ).
A staff stores all one's staff slave keys into one's password vault. For the
generation of client slave keys, a staff slave key becomes a staff master key Ksm.
145
Ksm is used together with client identity number CID, event identity number EID,
and current year Y to generate client slave keys from multihash key again for
different applications, where Kcs Multihash ( K SM II CID II EID II Y ). A client
stores all one's client slave keys into one's password vault. In this way, the higher
management people have escrowed the slave keys at the lower levels. This approach
can be used for supervisor-wise non-critical secrets but confidential to the external
parties.
7.9 Discussions on Variants of Multihash Key
Variants 1, 2, and 3 optionally require the passcode to work automatically or
are upgraded to become a big memorizaole secret created as in Figure 3.1. After the
passcode has been replaced by a big memorizable secret with at least 128 bits, the
sequence ID Q can be optionally used to make the generated slave keys unique.
Yet in the current Internet banking, a random number in an SMS (Short
Message Service) through mobile phone network, or a one-time-password token
(OTP token), like RSA SecurlD token, is used as a second authentication factor.
Meanwhile, variant 4 alternatively uses downcounting or upcounting of hash
iteration number to generate various slave keys from a master key to function as the
second authentication factor. Lastly, variant 5 is designed for the key management of
supervisor-wise non-critical secret in an organization like government, company,
university, and school, to function as a simple key escrow method and system.
146
CHAPTER 8 MULTIHASH SIGNATURE
Since the introduction of classical digital signature scheme in 1976, many
variants are created, such as blind signature, multisignature, group-oriented signature,
threshold signature, etc. These variants perform certain specific functions of digital
signature. Here, a new variant called multihash signature (aka object-designated
signature) is proposed, where a single message can have multiple digital signatures
from a single asymmetric key pair. This is done so by having a few rounds of
hashing to produce multiple hashes, which are then signed by a private key to
generate multiple unique digital signatures. All of these digital signatures can be
verified using the same public key. This variant has some new message management
functions, which are to trace a file downloaded from different mirror sites, to referee
an advertiser broadcasting the news of a sponsor, and to monitor the leaking source
that publicly discloses a classified digital file such as will, contract, form, etc.
8.1 Introduction
Digital signature scheme (Simmons, 1984; NIST, 2000, 2006c; Lyons-Burke,
2000; Atreya, Hammond, Paine, Starrett & Wu, 2002) was firstly conjectured by
Whitfield Diffie and Martin Hellman (1976). Then Ronald Lorin Rivest, Adi Shamir
and Leonard Max Adleman (1978, 1983) realized the first digital signature scheme
using RSA algorithm, which is a type of integer factorization cryptography (IFC).
Subsequently, this classical digital signature scheme has a lot of variants carrying out
certain specific functions.
These variants are blind signature (Chaum, 1982, 1988), multisignature
(Itakura & Nakamura, 1983; Boyd, 1989; Ham & Kresler, 1989), group-oriented
signature (Desmedt, 1987), undeniable signature (Chaum & van Antwerpen, 1989),
threshold signature (Desmedt & Frankel, 1989), fail- stop signature (Pfitzmann &
Waidner, 1990; Pfitzmann, 1996), group signature (Chaum & van Heyst, 1991),
proxy signature (Mambo, Usuda & Okamoto, 1996), signcryption (Zheng, 1997), and
forward- secure signature (Bellare & Miner, 1999).
147
Cryptographic hash function is used in digital signature scheme to process a
specific digital message with variable length, and produce a unique fixed- length bit
stream called hash (Dang, 2007a, 2007b; Wikipedia Contributors, 2008o, 2008w) to
represent the message. Since hash is like a summary of message, it is also known as
message digest and digital fingerprint. Hash function is a one-way function with the
properties of preimage resistance and collision resistance. MD5 (Rivest, 1992;
Wikipedia Contributors, 2008r), SHA-1 (Eastlake & Jones, 2001; NIST, 2002b;
Eastlake & Hansen, 2006; Wikipedia Contributors, 2008w) and RIPEMD-160 are the
most popular hash functions as of 2005 (Wikipedia Contributors, 2008o). They are
built based on the architecture of MD4. MD5 has a digest size of 128 bits and is no
longer sufficient for the minimum requirement of 160 bits by 2010. SHA-1 has been
compromised (Wang, Yin & Yu, 2005) and this hastens NIST to propose the
transition to SHA-2. SHA-2 consists of four variants: SHA-224, SHA-256, SHA-384
and SHA-512 (NIST, 2002b; Lilly, 2004; Eastlake & Hansen, 2006).
One of the many applications of secret is to assign a particular message with
particular object like meaning, function, or recipient. For instance (Cox, Miller,
Bloom & Fridrich, 2006), to prevent and trace the public disclosure of government
documents by the press, Margaret Thatcher, who was British former Prime Minister
in the 1980s, inserted certain unique number of white spaces (aka blanks) as secret in
documents distributed to different cabinet ministers, so as to identify the document
recipients who have disclosed the documents to the press. This is a type of covert
text watermarking with recipient-designated message. Recipients of cabinet ministers
here are designated objects for the message of distributed government documents.
Likewise, the secret of blanks can be used to represent other objects like
specific meaning and function. Anonymity and non-repudiation are two of its not yet
well-established requirements. Comparing with watermarking, digital signature has
stronger security strength in terms of randomness, integrity, and robustness.
Nevertheless, so far there is no object-designated message using digital
signature scheme. Hence, there exists a need to create object-designated signature
scheme with optional properties of anonymity and non-repudiation called "multihash
signature". There are a few applications of hash function. Here, multiple hashes are
148
processed to be generated from a single message. This is possible by using different
rounds of hash iteration. These unique hashes are then signed by a private key to
create multiple digital signatures that can be verified using the same public key. This
new variant of classical digital signature scheme has a few new functions in term of
better message management and control.
8.2 Classical Digital Signature Scheme
In a classical digital signature scheme, a message is hashed only once. Then,
a sender signs or encrypts this generated hash using his private key to produce a
digital signature. The message and digital signature are sent to one or more receivers.
To verify a digital signature, a receiver hashes the message to produce hash Hi and
decrypts the digital signature using the sender's public key to get H 2 . If Hi is the
same with H2, then the digital signature is verified; or else, it is rejected. The
pseudocode of this classical scheme is shown in Figure 8.1.
0.0 Initialization
0. 1 Sender has private key K Pte and public key K Pub .
0.2 There may be one or more receivers.
1.0 Signing a message
1.1 Sender hashes a message using hash function to get a hash H.
1.2 Sender signs or encrypts the hash H using K Pte to get a digital signature S.
1.3 Sender sends the message and digital signature S to one or more receivers.
2.0 Verifying a message
2.1 A receiver hashes the received message using hash function to get a hash Hj.
2.2 Receiver decrypts the digital signature S using K Pub to get a hash H 2 .
2.3 Compare Hi and H 2
2.3.1 If Hi is the same with H 2 , the digital signature S is verified;
2.3.2 else if Hi is not the same with H 2 , the digital signature S is rejected.
Figure 8.1 Pseudocode of the classical digital signature scheme
8.3 Applications of Hashing
Hash function has a few applications. It is used to hash a password or key to
form a hashed password to be stored in a computer for future authentication purpose.
149
In another password authentication scheme, hashing is used in password-
authenticated key exchange (PAKE) like SPEKE and SRP-6. Hashing is also used to
process a digital file to get a fixed- length bit stream uniquely representing this digital
file. It has the cryptographic properties of integrity and confidentiality in this case.
Any change to the message can change the hash value. Disclosing a message digest
does not reveals the contents of a message, but proves that an owner has this message
at an earlier time.
The message digest encrypted by a sender's private key produces a digital
signature that can be verified using the sender's public key. This is the classical
digital signature scheme. Further application of this classical scheme gives birth to
digital timestamping scheme (Haber & Stornetta, 1990, 1991). On the other hand,
hashing can be used for pseudorandom number generation as well.
There are some special applications of hashing. Key strengthening, wmch is
also called key stretching, is one of them (Kelsey, Schneier, Hall & Wagner, 1997).
A message like password or key is hashed many rounds. It is used to make a weak
key stronger by setting the key processing time at a maximum of one second. Some
variants of this key strengthening allow a master key to be concatenated with website
name to produce multiple site keys (aka slave keys) for different offline and online
accounts. There may be one or two levels of key strengthening. Some of the
examples are LPWA (Lucent Personal Web Assistant), HP Site Password, CPG
(Compass Password Generator), Password Multiplier, SPP (Single Password
Protocol), PwdHash, Passpet, and Multihash Key (Lee & Ewe, 2007a).
For our proposed digital signature scheme, the similar concept used in
multihash key is applied again. Instead of generating multiple hashes from a master
key, this time multiple hashes are created from a single message. This is the main
reason why this signature variant is called multihash signature.
8.4 Proposed Method: Single Message with Multiple Digital Signatures from
Single Asymmetric Key Pair
In multihash signature scheme, majority of the steps in classical digital
signature scheme are maintained. The main difference is that a message is hashed
150
using different number of hash iteration to produce multiple hashes. These hashes or
message digests are unique among themselves. When these message digests are
encrypted or signed using a sender's private key, different digital signatures are
created, but all the produced digital signatures can be verified using the sender's
public key. Figure 8.2 illustrates the pseudocode of this new signature variant.
0.0 Initialization
0. 1 Sender has private key K Pte and public key K Pub .
0.2 There may be one or more receivers with a maximum.
0.3 Sender keeps a table matching the numbers of hash iteration N to every
receiver.
1.0 Signing a message
1.1 Sender hashes a message using hash function for N rounds to get a hash H N .
1.2 Sender signs or encrypts the hash H N using K Pte to get a digital signature S N .
1.3 Sender sends the message and digital signature S N to receiver R N .
2.0 Verifying a message
2.1 Receiver R N hashes the received message for N rounds to get a hash H N1 .
2.2 Receiver decrypts the digital signature S N using K Pub to get a hash H N2 .
2.3 Compare H N1 and H N2
2.3.1 If H N i is the same with H N2 , the digital signature S N is verified;
2.3.2 else if H N1 is not the same with H N2 , the digital signature S N is rejected.
Figure 8.2 Pseudocode of the proposed multihash signature scheme
The sender sends the message and one of the digital signatures to every
receiver. Each receiver shall receive the same message but different digital signature.
Every digital signature has a different number of hash iterations. This hash iteration
number is concatenated to the digital signature file to ease the receiver in producing a
message digest for verification purpose. Every receiver has a different hash iteration
number, and they are indexed using this number by the sender in order to identify
them. The sender keeps a table that matches the hash iteration numbers to the
identities of receivers.
From the experiments on number of hash iterations with maximum one-
second message processing time, the following results for two sets of computer
systems are obtained. For the first computer system, it is a desktop PC with Pentium
151
II 266MHz 192MB RAM running on Windows XP Professional Edition. The upper
bound for one- second hash iteration is 8200. It means 8192 (= 2 13 ) receivers can be
supported using a 13-bit string to be concatenated to the digital signature.
For the second computer system, it is a laptop PC with Centrino Duo
1.66GHz 1.5GB RAM running on Windows XP Home Edition. Its upper bound for
one- second hash iteration is 93700. In other words, 65536 (= 2 16 ) receivers can be
supported using a 16-bit string. Yet for the third computer system, it is a desktop PC
with Pentium D 2.80GHz 512MB RAM running on Windows XP Professional
Edition SP3. Its upper bound for one- second hash iteration is 122,500. In other words,
65536 (= 2 16 ) receivers can be supported using a 16-bit string.
Better computer systems with better performance can support larger number
of receivers. However, to have one- second message processing for all the computer
systems, the oldest computer system that is still in the market has to be the main
parameter in setting the maximum number of receivers.
In short, multihash signature method and system can provide object-
designated signature message with specific meaning, function, or recipient as
illustrated in Figure 8.3. A message is hashed iteratively for variable rounds by a
signor, and later signed using signor's asymmetric private key to generate a new type
of digital signature. This new digital signature only differs from the conventional
digital signature in the aspect that it carries the information of hash iteration number
as well. In other words, a message can have multiple digital signatures from an
asymmetric key pair, and each hash iteration number can be designated for any
object, action, feature, function, meaning, recipient, etc., as a representation. Here,
the signor keeps a table matching the hash iteration number and its represented object.
8.5 Comparisons for Advantages
Table 8.1 shows the main differences between the classical and multihash
signature schemes. The proposed variant has the same security strength as classical
scheme. The key difference is a message is hashed for one round in classical digital
signature scheme; whereas a message is hashed for variable round in multihash-
based digital signature scheme. This allows our signature variant to have variable
152
number of digital signatures per message, where classical scheme has one digital
signature per message.
2200
V
Settings of multihash signature to provide object-designated signature message:
(1) Signor S has an asymmetric key pair of private key K pte and public key K pub
(2) There may be one or more designated objects with a maximum like signee (or
signature receiver), action, feature, function, meaning, etc.
(3) Signor keeps a table matching the numbers of hash iteration N to each
designated object N
V
Signor S signing a message M:
(1) Signor S hashes a message M using a hash function for N rounds to get a hash
value H N
H N Hash (M , N)
(2) Signor S signs or encrypts the H N using K pte to get a digital signature S N
S N Sign (H N , K p te)
(3) Signor S sends the message M and signature S N to signee R N
[M , S N ] sent to R N
V
Signee R N or other parties verifying a signature message:
(1) Signee R N receives message Mi and digital signature S N i from the signor
[M! , S N1 ] ᅳ [M , S N ] ᄂ
(2) Signee R N hashes the Mi for N rounds to get a hash value H Ni
(3) Signee R N decrypts the S N i using K pub to get a hash value H N2
(4) Signee R N compares H N1 and H N2 :
if H N1 = H N2 , digital signature S N i is verified to be signature of Mi ;
else if H N i 4- H N2 , digital signature S N1 is rejected . end
(5) Signee R N signs S N i using one's private key K pteR to create acknowledgment
message M ack for recipient non-repudiation, and sends M ack to the signor S
V
Signor verifying an ooject-designated signature message :
(1) Signor S receives message Mu and digital signature S N u from somewhere
(2) Signor S hashes the Mu for N rounds to get a hash value H Nm
(3) Signor S decrypts the S NU using K pub to get a hash value H NU2
(4) Signor S compares H NU i and H NU2 :
if H NU i = H NU 2 , digital signature S N u is verified to be signature of Mu
else if H NU i ^ H NU2 , digital signature S N u is rejected . end
(5) if S N u is verified, then received Mu and S N u are from signee R N
Figure 8.3 Multihash signature method and system to provide object-designated
signature message
153
2202
Table 8.1 Comparisons of classical and multihash-based digital signature schemes
Difference
Classical
Multihash Signature
Number of hash iterations
One
Variable
Number of digital signatures per message
One
Variable
To trace a rile downloaded rrom dirrerent mirror
sites
No
Yes
To referee an advertiser broadcasting the news or
a sponsor
No
Yes
To monitor the leaking source that publicly
discloses a classified digital file
No
Yes
Security compared with classical digital
signature scheme
Same
These two main differences create three further differences that act as new
functions to digital signature scheme in term of message management and control.
Firstly, this proposed signature variant can trace a file downloaded from different
mirror sites. For example, current executable s in some websites are EXE files listed
together with .SIG files. .SIG file is a digital signature file format that allows users
who have downloaded the executable to verify the integrity of this executable.
Normally, there is more than one link for download, and these links are sharing the
same .EXE and .SIG. It would be better if we have a single .EXE with different .SIG
riles for different mirror sites. An administrator can create a table matching the hash
indices with respective mirror sites in the process of creating the multiple digital
signatures. This allows the administrator to trace the mirror site of an executaole.
Secondly, this signature variant can referee an advertiser broadcasting the
news of a sponsor. Let say someone acting as a sponsor wants to advertise news like
job recruitment, where an advertiser acting as a broadcaster of this news can earn an
allowance if an audience is successfully acquired to certain degree like interviewed
or recruited. If this sponsor does not want the information of the advertiser to be
displayed in the message file, then the sponsor can opt to have multiple digital
154
signatures for a single advertisement message. The number of hash iterations in the
digital signature file is matched to the identity of an advertiser. This matching table is
kept by the sponsor. In short, a sponsor can trace the performance of each advertiser,
who acts as a referee, by using an exactly unique message without having any
reference number in the message, where any difference in the message file can cause
ambiguity to the receivers like future employees and customers.
Thirdly, it can monitor the leaking source that publicly discloses a classified
digital file such as will, contract, form, etc. For instance, in a will, the involved
parties are will holder, lawyer(s), and witnesses. Every lawyer and every witness are
issued a different set of digital signatures with different hash iteration number to
identify them. The will holder keeps this matching table. Whenever there is a public
leakage of the will before the death of the will holder or any allowed period, the will
holder or any other party can identify who is the leaking source.
In short, advantages of multihash signature are designated recipient function
to alternate with watermarking, object-designated meaning, referral function,
anonymity support, avoidance of name clashing and renaming problems, stronger
collision resistance than method using the hashing of the concatenation of message
digest and object name like Equation (8.1), as well as recipient non-repudiation. The
example of object-designated meaning is the cheque validity status including status
like valid, invalid, paid, void, on hold, late processing, rejected, withdrawn, cancelled,
etc. The examples of referral functions are to trace a file downloaded from different
websites, to referee an advertiser broadcasting the news of a sponsor, and to monitor
the leaking source that has publicly disclosed a classified digital file.
Hash Value = Hash(Hash(Message) II Object Name) (8.1)
Here, multihash signature is used in some other inventions of this doctoral
research project. One of them is called triple-watermark digital cheque and another is
triple-watermark software licensing schemes in Chapter 10, together with MePKC,
steganography, and watermarking. The security of multihash signature has the same
strength with the conventional digital signature scheme. For higher security to trace
the identity of an Internet user signing a message and one's Internet geographical
155
region, a message is suggested to be hashed and concatenated with MAC address
and/or IP address, and then undergoes an optional conventional digital signature or
multihash signature as in Equation (8.2) where S = Signature.
S = Multihash Signature (Hash (Message) II MAC Address II IP Address) (8.2)
8.6 Conclusion
In a nutshell, introducing variable round of hash iterations on a message can
create new functions to digital signature scheme. Using multiple digital signatures
from single message, which are sent to different receivers, can trace the file
downloaded from some mirror sites, referee an advertiser broadcasting the
advertisement of a sponsor, and monitor the leakage of any classified digital file. The
digital signatures in this proposed signature variant called multihash signature are
unique among themselves. However, they can be verified using single public key
even though they are generated from single message.
156
CHAPTER 9 APPLICATIONS OF BIG SECRET & MePKC
(PART 1)
9.1 Applications of Created Big Memorizable Secret(s)
For useful applications of the created big memorizable secret(s) and MePKC
(Memorizable Public-Key Cryptography), they include:
(i) methods and systems to realize memorizable symmetric key the secret till
resistance to quantum computer attack;
{11) methods and systems to realize memorizable public-key cryptography
(MePKC);
^m) methods and systems to improve security strength of other cryptographic,
information-hiding, and non-cryptographic applications of secret beyond
128 bits;
(iv) method and system to harden the identification of embedded data in
steganography although stego-data has been detected;
(v) method and system to transfer fund electronically over a remote network
using MePKC;
^vi) method and system to license software electronically over a remote
network using MePKC;
{vii) methods and systems to authenticate human-computer and human-
human communications at a local station or over a remote network using
MePKC;
^vin) method and system to use digital certificate with more than one
asymmetric key pair for different protection periods and password
throttling;
(ix) method and system to use three-tier MePKC digital certificates for ladder
authentication;
157
(x) method and system to store, manage, and download voice and video calls
of mobile phone and wired phone at online distributed servers;
(xi) method and system of multipartite electronic commerce transactions; as
well as
(xii) Method and system to boost up the trust level of MePKC digital
certificate by using more than one certification authority (CA) and/or
introducer of trust of web.
Applications (i-iii) are presented in this Chapter 9. Applications (iv-vi) are
presented in Chapter 10. Applications (,vii-ix) are explained in Chapter 11. For
applications (x-xii), they are in Chapter 12.
To apply big memorizable secret(s) to the novel methods and systems using
MePKC from (iv) to (xii), two more independent inventions are applied here to
enhance the features of MePKC. These two inventions are multihash key and
multihash signature (aka object-designated signature). Multihash key includes some
methods and systems to generate multiple slave keys from a single master key as in
Chapter 7. Meanwhile, multihash signature includes a method and system to generate
object-designated signature message with specific feature, meaning, function, or
recipient as in Chapter 8.
9.2 Memorizable Symmetric Key to Resist Quantum Computer Attack
Due to the successful cracking of 56-bit DES (Data Encryption Standard) in
the 1990s, stronger symmetric ciphers with larger symmetric key sizes like 80-bit
2TDES, 112-bit 3TDES, as well as 128-, 192-, and 256-bit AES (developed from
Rijndael cipher) are introduced to replace the DES.
Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson and Wiener (1996)
discussed the minimal key lengths for symmetric ciphers. The NIST (National
Institute of Standards and Technology), USA, proposes different protection periods
for security through years 2010, 2030, and beyond 2030, for 80, 112, and 128 bits,
respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b). ECRYPT of
158
European Union (EU) proposes in its technical reports that 80-, 96-, 112-, 128-, and
256-bit security have protection periods of 4 years through year 2010, 10, 20, 30
years, and foreseeable future to be against quantum computer attack, respectively
(Gehrmann & Naslund, 2005, 2006, 2007). Nevertheless, conventional methods and
systems normally can only realize a key size of 128 bits or less.
Hence, the first application 9.1(i) of the present invention in applying the
created big memorizable secret is to realize higher security levels of symmetric
ciphers like AES-192 and AES-256. By using the methods and systems as in Figure
3.1 and Table 3.3, it can be observed that the current highest security level of
symmetric cipher at 2^o bits can be practically realized and achieved using big
memorizable 256-bit secret. For another onef explanation, please visit Section 4.3.9.
9.3 Memorizable Public-Key Cryptography (MePKC)
9.3.1 Related Works: Storages of Private Key
For the current asymmetric key crypto system, a private key is normally
encrypted using another symmetric key. The encrypted private key is storea in a
local computing system or token; whereas the symmetric key is stored in the human
brain. The present possible attacks for this method are guessing attack, dictionary
attack, and pre-computation attack.
Another method is to split the private key into two or more portions (Ganesan,
1996b; Bishop, 2003, pp. 264-265). There are other literary works about split private
key cryptography over here (Ganesan, 1996a, 1998a, 1998b, 1998c, 1999; Ganesan,
Sandhu, Cottrell & Austin, 2006a, 2006b, 2006c; Ganesan, Sandhu, Cottrell,
Schoppert & Bellare, 2006; Ganesan & Yacobi, 1996; Sandhu, deSa & Ganesan,
2003, 2005a, 2005b, 2005c, 2006a, 2006b, 2006c, 2006d, 2006e, 2006f; Sandhu,
Schoppert, Ganesan, Bellare & deSa, 2006a, 2006b, 2006c, 2006d, 2006e, 2006f,
2007a, 2007b, 2007c, 2007d; Sandhu, Ganesan, Cottrell, Renshaw, Schoppert &
Austin, 2007; ). The first portion of the private key can be derived from a normal
human- memorizable symmetric key. The other portions of the private key are stored
as encrypted partial private key alike the normal encrypted private key. This method
resists the pre-computation attack.
159
A third method is to store the encrypted private key in a server connected to a
computer communication network (Baltzley, 2000, 2001a, 2001b). A user has the
roaming capability where the encrypted private key can be downloaded from the
server for decryption at anywhere. Proxy servers are needed for this method to avoid
single point of failure. Its possible attacks are the same as encrypted private key
stored in the local computing system.
9.3.2 The Proposed MePKC Appliacation 9.1(H)
The second application 9.1(ii) of the present invention in applying the created
big memorizable secret is to improve from the token-based public-key cryptography
(PKC) to the realization of secret-based PKC using fully memorizable private key,
which is named as MePKC (Memorizable Public-Key Cryptography) or MoPKC
(Mobile Public-Key Cryptography) here. The main advantages of MePKC are full
secret memorizability and mobility convenience. Yet another quite important
advantage is that secret-based MePKC can resist some side-channel attacks
vulnerable to token-based PKC, such as those attacks over the fully or partially
encrypted private key. For illustration of MePKC, please refer to Figure 9.1. For
another brief explanation, please visit Section 4.3.9.
The current lowest key size requirement of asymmetric private key is 160 bits
operating in FFC and ECC. From Table 3.3 listing all the proposed novel methods
and systems to create big memorizable secret, a 160-bit secret for 160-bit fully
memorizable private key can be supported by self-created signature-like Han
character for CLPW and CLPP, 2D key, multilingual key, and multi-tier geo-image
key. This group of big memorizable secret creation method and system can easily
support memorizable private key up to 256 bits at the symmetric bits of security
strength of 128 bits and for a protection period of 30 years.
For higher security levels up to 512-bit secret used by 512-bit MePKC, multi-
factor multimedia key using software token has to be adopted to halve the key size
requirement towards a practical realization. Here, the mobility convenience is
somehow sacrificed.
160
1300
V
Optionally activate the anti-keylogging software.
1301
Y
Open the MePKC application software operating on at least 160-
bit ECC (Elliptic Curve Cryptography) for its input interface.
/X 끼
1302
User creates an n-bit secret S like 256 bits using one or more methods as follows:
(1) Self-created signature-like Han character for CLPW and later CLPP
(2) ASCII-based 2D key
(3) Unicode-based 2D key
(4) Multilingual key
(5) Multi-tier geo-image key
(6) Conventional secret creation methods and other future methods
1303
User creates an asymmetric key pair as follows:
(1) Let Kpte = private key, K pub = public key
(2) Kpte Box 404 (S), optional secret processing of memorizable secret S
(3) K pub Public Key Generation (K pte )
(4) Store the K pub and clear K pte in the computer memory
(5) Create pubUc key certificate (aka digital certificate) from K pub using certificate
authority or introducer of web of trust
(6) Optionally publish and/or send the public key certificate to other PKC users
1304
Apply the asymmetric key pair and public key certificate for
various MePKC applications like encryption, signature, etc.
1305
V
Clear the memory storing all forms of secrets. Then, close all the
application software.
1306
Figure 9.1 Operation of MePKC method and system
To generate this software token, firstly a Dig multimedia data file like random
or non-random bit stream, text, image, audio, animation, or video, is hashed by a 211-
bit hash function to produce 2n-bit hash value. The 2n-bit hash value is encrypted by
using an n-bit symmetric key and n-bit AES to further produce a software token.
161
Then, the multimedia data file is destroyed or hide at a safe location like safety box,
and the software token is either stored in a local storage device like USB flash drive
or in a remote server accessible through roaming network.
A user remembers only the n-bit secret of symmetric key. Whenever 2n-bit
MePKC is needed for various applications, the software token is acquired and
decrypted using the n-bit memorizable secret of symmetric key to obtain the 2n-bit
hash value. This n-bit secret and 2n-bit hash value are then used to derive the 2n-bit
MePKC private key.
The MePKC can be used for major PKC cryptographic applications like
encryption and digital signature schemes. Other minor applied cryptographic
schemes are key exchange, authentication, blind signature, multisignature, group-
oriented signature, undeniable signature, threshold signature, fail- stop signature,
group signature, proxy signature, signcryption, forward- secure signature, designated-
verifier signature, public-key certificate (digital certificate), digital timestamping,
copy protection, software licensing, digital cheque (aka electronic cheque), electronic
cash, electronic voting, BAP (Byzantine Agreement Protocol), electronic commerce,
MAC (Message Authentication Code), key escrow, online verification of credit card,
multihash signature, etc.
The blind signature scheme includes its further applications for electronic
cash (aka e-cash, electronic money, e-money, electronic currency, e-currency, digital
cash, digital money, digital currency, or scrip), and electronic voting (aka e-voting,
electronic election, e-election, electronic poll, e-poll, digital voting, digital election,
or digital poll).
Advancement of computing technologies requests for longer key sizes for a
fixed protection period. To freeze this unwanted request, key strengthening (aka key
stretching) through many rounds of hash iteration, together with hash truncation and
a hash function with longer hash value like 768, 1024 bits or more, can be used.
MePKC is extended to a novel claimed invention here called multihash
signature scheme, and novel innovations of some cryptographic schemes like digital
cheque, software licensing, human-computer and human- human authentication via a
162
computer communications network, as well as MePKC digital certificate with
multiple public keys for password throttling and ladder authentication.
These MePKC applications are best to be implemented using the ECC
(Silverman, 1986; Blake, Seroussi & Smart, 1999, 2005; Hankerson, Menezes &
Vanstone, 2004, 2005; Zhu & Zhang, 2006). This is because ECC needs a minimum
private key size of 160 bits and it has been long time tested for its security strength.
Alternatively, depending on further research and evaluation, shorter private key size
at equivalent or better bits of security strength can be achieved by using hyperelliptic
curve cryptography (HECC) (Pelzl, Wollinger & Paar, 2004; Cohen & Frey, 2006;
Wang & Pei, 2006) and possibly other crypto systems like torus-based cryptography
(TBC) (Rubin & Silverberg, 2003).
For HECU, the genera 2 and 3 have so far been tested to have shorter key size
requirement than ECC by twice and thrice. Between them, genus-2 HECC has a
higher security without the demand to have a correction factor for its key size. In
other words, the correction factor of HECC of genus 2 is 1. As information, genus-3
and genus-4 HECC have a correction factor of 1.05 and 1.286 times of its field,
respectively, for the key size to get a larger group order at equivalent bits of security
strength. For more information, please refer to an article entitled "High Performance
Arithmetic for Special Hyperelliptic Curve Crypto systems of Genus Two" by Jan
Pelzl, Thomas Wollinger, and ChristofPaar (2004).
9.4 Other Cryptographic, Information-Hiding, and Non-Cryptographic
Applications of Secret beyond 128 bits
The third application 9.1(m) of the present invention in applying the created
big memorizable secret is various other cryptographic, information- hiding, and non-
cryopto graphic applications needing a big memorizable secret(s).
The other cryptographic applications include various PAKE (Password-
Authenitcated Key Exchange) like SPEKE (Simple Password Exponential Key
Exchange) (Jablon, 2006) and SRP-6 (Secure Remote Password Protocol version 6)
(Wu, 2003).
163
Meanwhile, information- hiding applications (Petitcolas, Anderson & Kuhn,
1999; Moulin & O' Sullivan, 2003) include stego-key in steganography (Simmons,
1984, 1998; Anderson & Petitcolas, 1998; Cachin, 1998; Mittelholzer, 1999; Fridrich
& Goljan, 2004; Fridrich, Goljan & Soukal, 2004; Lu, 2005), secret key in
symmetric watermarking, and private key in asymmetric watermarking (Swanson,
Kobayashi & Tewfik, 1998; Low & Maxemchuk, 1998; Hartung & Kutter, 1999;
Mittelholzer, 1999; Mohanty, 1999; Wolfgang, Podilchuk & Delp, 1999; Eggers, Su
& Girod, 2000; Collberg & Thomborson, 2002; Hachez & Quisquater, 2002; Arnold,
Schmucker & Wolthusen 2003; Furon & Duhamel, 2003; Barni & Bartolini, 2004;
Furon, 2005; Cayre Fontaine & Furon, 2005a, 2005b, 2005c; Lu, 2005; Cox, Doerr
& Furon, 2006; Furht & Kirovski, 2006a, 2006b).
Lastly, non-cryptographic applications include seed for PRNG (Pseudo-
Random Number Generator) and CSPRBG (Cryptographically Secure Pseudo-
Random Bit Generator) (Eastlake, Crocker & Schiller, 1994; Rukhin, Soto,
Nechvatal, Smid, Barker, Leigh, Levenson, Vangel, Banks, Heckert, Dray & Vo,
2001; Le Quere, 2004; Keller, 2005; Barker & Kelsey, 2007; Campbell & Easter,
2007b) like the Blum-Blum-Shub (BBS) CSPRNG (Mollin, 2007a, p. 508, 2007b).
164
CHAPTER 10 APPLICATIONS OF BIG SECRET & MePKC
(PART 2)
10.1 Identification Hardening of Embedded Data in Steganography
10.1.1 Related Works
Steganography is a branch of information hiding. Secret message acts as
embedded data into a cover data under the control of a stego-key to form a stego-data.
Stego-data in its forms of storage and transmission through an insecure channel shall
be like a normal data without triggering the suspicion of a person sensing the stego-
data. To retrieve the secret message, the stego-data is processed using the stego-key
to get back the embedded data.
In the current prior art, reliable detection of stego-image can be done
successfully as shown by Fridrich and Goljan (2004). Yet the stego-key searching
can also be done within promising time for a short stego-key.
This is reported by Fridrich, Goljan, and Soukal (2004) in "Searching for the
Stego-Key" that as long as the embedded message is not occupying 100% of image
capacity, then stego-key searching is independent of encryption key and takes about
12 hours to crack a 30-bit stego-key. Hence, there exists a need to have a big and yet
memorizable stego-key, and to somehow fully occupy the data capacity for higher
complexity to resist the cracking of steganographic system.
10.1.2 The Proposed MePKC Application 9.1(iv)
The fourth application 9.1(iv) of the present invention in applying the created
big memorizable secret is to boost up the key size of stego-key to be more than 128
bits. Based on extrapolation of an article by Fridrich, Goljan, and Soukal (2004), for
an 80-bit stego-key, it has a protection period of about 5 years or usable by year 2010
alike the 80-bit symmetric key. It is the contribution of the present embodiment to
harden the identification of embedded data in steganography even after the stego-
data has been detected as in Figures 10.1-10.2.
165
2300
V
Required components to harden the identification of embedded data in steganography:
(1) Steganosystem where sender and receiver of a stego-data shared a stego-key
(2) Symmetric key cryptosystem like AES-256
(3) Asymmetric key cryptosystem like 512-bit MePKC operating on ECC
(4) CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator)
(5) Lossless multimedia data compression like BMP, PNG, and TIFF for image
V
Preparing ciphertext of embedded secret data M and symmetric key K SY :
(1) Generate an n-bit random number as a symmetric key K SY , where n = 256
(2) Encrypt the embedded data M using K SY under AES-256 to produce ciphertext Cj
(3) Encrypt the K SY using recipient' s public key K pub to produce NL-bit ciphertext Ck
where N L = 512
V
Creating a stego-data by embedding secret message into cover-data:
(1) Seed an N S T-bit stego-key K ST into a CSPRBG to produce sequential units of N R -bit
bitstream B, where Nst = 256 and Nr = 32
(2) Assume the cover data is a PNG image with dimensions (x * y) and bit depth per
channel at B P bits for channels RGBA, where x = y= 1024, B P = 8, N P = number of
bits/pixel = 32, then S S i ze = maximum supported size of embedded data in a cover data
= ぶ * y * Bp = 1024 * 1024 * 8 > total size of C M and C K
(3) Every pixel of the image is indexed by an address location starting from the top
leftmost pixel, moving to the rightmost pixel, and then continuing with the leftmost
pixel of the second line, and so on, until the rightmost pixel in the last bottom line
(4) For every sequential unit of NR-bit bitstream B, calculate L P = (B mod (x * y)) to get
the selected pixel location in the cover image, where L P = B mod 2 20 , and first, second,
third, and so on of the B are labeled as B , B } , B 2 , -. -, B N
(5) For every B N , record it into an index table, and if a B N has occurred previously, mark
and use the subsequent (B N + 1) as the selected pixel location
(6) Chunk the Ck and Cm into Bp-bit block, and store the chunks of Ck first, followed by
chunks of Cm, one by one, into the Bp-bit alpha channels addressed by the NR-bit
bitstream B to produce a partially completed stego-data
V
Creating a stego-data with data capacity fully occupied where for example data is image:
(1) Seed another CSPRBG with the present clock time to produce sequential garbage
units of Bp-bit bitstream G to harden the identification of embedded data
(2) Store G addressed by additional NR-bit bitstream B into the remaining alpha channels
of remaining pixel locations until the index table has all the pixel locations marked
Figure 10.1 Data embedding process into a cover data for method and system to
harden the identification of an embedded data in steganography although stego-data
has been detected
166
〜蕭
2302
2304
2400
V
Required components to extract the embedded data from the hardened stego-data:
(1) Steganosystem where sender and receiver of a stego-data shared a stego-key
(2) Symmetric key cryptosystem like AES-256
(3) Asymmetric key cryptosystem like 512-bit MePKC operating on ECC
(4) CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator)
(5) Lossless multimedia data compression like BMP, PNG, and TIFF for image
V
Calculating the embedded sequences of symmetric key Ks Y and embedded secret
data M:
(1) Use NsT-bit stego-key Ks T to generate sequential units of N R -bit bitstream B
(2) Calculate L P = (B mod (x * y)) and its subsequent value if there is a clash to
get the series of selected pixel locations in the stego-image
(3) Extract the ciphertext C K
(4) Extract the ciphertext C M
2402
、
Decrypting the ciphertexts of symmetric key C K and embedded secret data C M :
(1) Decrypt the ciphertext C K using the recipient's private key K pte to get
symmetric key Ks Y
(2) Decrypt the ciphertext C M using the K SY to retrieve the embedded data M
、
,
Clear the memory storing all forms of secrets and close all the application
software.
2403
2404
Figure 10.2 Data extracting process of embedded data from a stego-data for method
and system to harden the identification of an embedded data in steganography
although stego-data has been detected
Firstly, a stego-key is shared between the sender and receiver using some key
exchange protocol like PAKE and MePKC key exchange scheme. Then, a symmetric
key is created from a CSPRBG and use it to encrypt an embedded secret data to
produce ciphertext of embedded data Cm. The symmetric key is later encrypted by
recipient's public key to produce ciphertext of symmetric key Ck. To identify the
address locations to hide the Cm and Ck, another CSPRBG is seeded with the stego-
key and used to produce a list of addresses. Every unique address is recorded in an
167
index table. If a generated address clashes with an address in the index table, then its
subsequent address not in the index table is used.
After the Cm and Ck are hidden into the cover data, then use a third CSPRBG
to generate random garbage bit streams G and use them to fully occupy the
remaining data capacity. Consequently, from the full occupation of data capacity, the
complexity to search for a stego-key will be higher when even encryption key
searching is needed for cracking. To paralyze the stego-data detection, a sender can
often broadcast dummy stego-data with noises as the embedded data.
10.2 Electronic Fund Transfer Using MePKC
10.2.1 Related Works
Among the various applications of digital signature scheme, electronic
cheque (aka digital cheque) is a special and important type of messages. Electronic
cheque (Doggett, Jaffe & Anderson, 1997; Anderson, Jaffe, Hibbert, Virkki, Kravitz,
Chang & Palmer, 2000, 2001) introduced another form of electronic fund transfer
using conventional digital signature scheme. The popularity of these method and
system are low due to the drawbacks of PKC (Public-Key Cryptography), i.e. low
mobility of partially or fully encrypted private key, and management difficulty of
certificate revocation list. Furthermore, the digital signature of Doggett' s method
carries only the information of electronic fund transfer from a payer to a payee via
one or more banks.
In fact, a physical cheque has various processing states for accounting records
like blank cheque, signed for payment, paid cheque, returned cheque by payee,
withdrawn payment by payer, withdrawn payment by payer's bank, bounced cheque,
advanced cheque, outdated cheque, fake cheque, etc.
Yet for electronic cheque, that transfer fund between accounts electronically
and speedily throughout the world in the computer network, it shall have more
optional security protection beyond the digital signature because money is a sensitive
and critical object to be tracked for the convenient investigation of (organized)
criminal activities (Lampe, No date; Glick, 1995; Livingston, 1996; "UNODC and
168
2502d {
Organized Crime," No date; Layman & Potter, 1997; Maxim & Whitehead, 1998;
Chen, 2004; Ruan & Wang, 2005; Siegel, 2005; Wang, 2007; "Identity-Related
Crime," 2007; He, 2007; United Nations Office on Drugs and Crime (UNODC),
2004, 2008; Wikipedia Contributors, 2008s, 2008af) and civil cases.
2500
People Bank Cheque No.: ABC123 Payer's Name: Kok-Wah Lee
Kampsu-, Perak, Malaysia I C /Passport: MY1234S67890
Email: che que @p e opleta ank . c om.my Email: kokwah@xpreeli.com
2501
People Bank
Cheque No.: ABC123 Payer's Name: Kok-Wah Lee
Kampar, Perak, Malaysia
Email: che que @p e opleb ank . c om.my
Payee's Name: Xpree Jinhua Li
IC/Passport: MY1 234567891
Email: xpreee@gmail.com
Pay Ringgit One Thousand Only.
IC/Passport: MY1234S67890
Email: kokwah@xpreeli.com
Date: 24 June 2008
Amount: MYRS1 000-00
Figure 10.3b Written cheque signed by payee
2502
People Banh
Cheque No.: ABC123 Payer's Name: Kok-Wah Lee
Kampar, Perak, Malaysia
Email: che que @pe opleb arik.c om.my
Payee's Name: Xpree Jinhua Li
IC/Passport: MY1 234567891
Email: xpreee@gmail.com
Pay Ringgit One Thousand Only.
IC/Passport: MY123+S67890
Email: kokwah@xpreeli.com
Date: 24 June 2008
Amount: MYRS1 000-00
2500a
>■ 2500b
> 2500c
2501a
>■ 2501b
> 2501c
2502a
y 2502b
2502c
Figure 10.3c Processed payee's cheque by bank
Figure 10.3 Samples of digital cheque in triple-watermark digital cheque scheme
169
2600
\レ
Required components for a digital cheque method and system:
(1) Symmetric and asymmetric watermarking systems
(2) Asymmetric key cryptosystem like 512-bit MePKC operating on ECC
(3) CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator)
(4) Lossless multimedia data compression like BMP, PNG, and TIFF for image
V
Key exchange for a shared symmetric WM key K WM between payer and bank:
(1) Payer creates K WM using a username, random number R, and payer's private
key Kp te i
K W m Sign ( Hash (Username II R) , K ptel )
(2) Payer sends the K WM to bank using a key exchange protocol like MePKC
V
Bank preparing blank cheque for payer:
(1) Bank writes the bank (name, branch, email, etc.), payer (name, IC/passport,
email, etc.), and cheque number in a blank PNG image file as in Figure 25a
(2) For the partial image portion 2500a, hash it and then sign the hash using
bank's private key K pte0 to produce signature S
S Sign ( Hash (Image Portion 2500a) , K pte0 )
(3) Bank embeds S as first watermark WM to the top band of image portion
2500c in red using K WM to select pixel address locations for WM embedding
as in Figure 23, where K WM acts like the stego-key
(4) Other remaining pixel locations in the red band are filled with random bits
(5) Bank sends the prepared blank cheque CHQ 2500 to a payer
V
Payer verifying, writing, and signing a digital cheque:
(1) Payer verifies WM of CHQ using K WM and bank's public key K pub0
(2) If WM is verified, payer writes the payee (name, IC/passport, email, etc.),
cheque amounts, and date to create image portion 2501b as in Figure 25b
(3) For the partial image portions 2501a and 2501b, hash them and then sign the
hash using payer's private key K ptel to produce signature Si
Si Sign ( Hash (Image Portion 2501a II Image Portion 2501b) , K ptel )
(4) Payer embeds Si as second watermark WMi to the middle band oi image
portion 2501c in green using K WM to select pixel address locations for WMi
embedding as in Figure 23, where K WM acts like the stego-key again
(5) Other remaining pixel locations in the green band are filled with random bits
(6) Payer sends written and signed digital cheque CHQi to payee via MePKC
Figure 10.4 Creation of blank cheque by a bank and written cheque by a payer in the
triple-watermark digital cheque method and system
170
〜肅
ᅮ 2602
ᅮ 2603
From 2604
V
Payee's cheque crediting actions in a digital cheque method and system:
(1) Payee uses MePKC encryption scheme to decrypt the received digital cheque
CHQi from payer
(2) Payee uses MePKC digital signature scheme to verify the integrity of CHQi
(3) If CHQi is verified, payee sends CHQi to payer's bank or payee's bank
(4) If payee's bank, payee's bank routes CHQi to payer's bank via bank network
V
Bank processing written cheque CHQi for payer and payee:
(1) Bank verifies WMi of CHQi using K WM and payer's public key K publ
(2) If WMi is verified, bank obtains the payer's signature Si to order a payment
(3) Bank uses multihash signature to sign the image portion 2502d using bank's
private key K pte0 for an object-designated status of processed cheque like valid,
invalid, paid, void, on hold, late processing, rejected, withdrawn, cancelled,
etc., and then to produce signature S 2
S 2 Multihash Signature ( Hash (Image Portion 2502d) , K pte o )
(4) Bank embeds S 2 as third watermark WM 2 to the bottom band oi image portion
2502c in blue using bank's asymmetric watermarking private key K WM , pte or
published symmetric WM key K WM2 to select pixel address locations for WM 2
embedding as in Figure 23, where K WM , pte or K WM2 may also act like stego-key
(5) Other remaining pixel locations in the blue band are filled with random bits
(6) Payer's bank debits the payer's account for the cheque amount
(7) Payer's or payee's bank credits the payee's account for the cheque amount
(8) Bank sends processed digital cheque CHQ 2 to payer and payee via MePKC
V
Payer verifying the processed digital cheque CHQ 2 :
(1) Payer verifies WM 2 of CHQ 2 using bank's asymmetric watermarking public
key K WM , pub or published K WM2 , and bank's public key K pub0
(2) If WM 2 is verified, payer checks the bank account for the debit transaction
(3) Otherwise if WM 2 is rejected, payer reports to the bank for investigation
V
Payee verifying the processed digital cheque CHQ 2 :
(1) Payee verifies WM 2 of CHQ 2 using bank's asymmetric watermarking public
key K WM , pub or published K WM2 , and bank's public key K pub0
(2) If WM 2 is verified, payee checks the bank account for the credit transaction
(3) Otherwise if WM 2 is rejected, payee reports to the bank for investigation
Figure 10.5 cheque crediting process by a payee in the triple-watermark digital
cheque method and system
171
〜謂
〜篇
2702
2703
Hence, there exists a need to boost the PKC popularity, to add more
embedded information, and to increase the security strength of electronic cheque, by
applying fully memorizable private key, object-oriented signature scheme (aka
multihash signature scheme), and optional fragile watermarking scheme, respectively.
10.2.2 The Proposed MePKC Application 9.1(v)
The fifth application 9.1(v) of the present invention in applying the created
big memorizable secret is a method and system to transfer fund electronically over a
remote network using MePKC, CSPRBG, lossless data compression, as well as
information- hiding techniques like steganography and fragile watermarking, as in
Figures 10.3-10.5 and called triple-watermark digital cheque method and system.
Stronger security and prettier aesthetics are needed for digital cheque that is faster,
more efficient, and more environment-friendly than paper cheque and electronic
textual cheque using PKC merely.
There are three watermarks in the digital cheque. The first watermark marks
the information of payer's bank, payer, and cheque account signed by a payer's bank.
The second watermark marks the information of payee and cheque amount signed by
a payer. The third watermark marks the cheque status after processed by the payer's
bank like valid, invalid, paid, void, on hold, late processing, rejected, withdrawn,
cancelled, etc.
To save the image size, lossless image compression file format like PNG
(Portable Network Graphics) and TIFF (Tagged Image File Format) shall be used
besides BMP (Bitmap file format). Moreover, the digital cheque can also be in the
data type of text. Also, this method and system can be modified and applied in other
fields like software licensing.
10.3 Electronic Software Licensing Using MePKC
10.3.1 Related Works
Yet in another application of PKC (Public-Key Cryptography), software
licensing is part of software copy protection besides code obfuscation against reverse
172
engineering, watermarking against software piracy, and tamper-proofing against
tampering (Collberg & Thomborson, 2002). In the current prior art, software
licensing scheme uses fully or partially encrypted private key of PKC. Token
containing the encrypted private key is subject to loss and damage; whereas server
containing the encrypted private key is subject to virtual hacking and subsequently
guessing attack, dictionary attack, and pre-computation attack.
For computer software, its representative monetary value is its software
product ID key rather than the duplicable electronic executable and storage device
like floppy disk, CD-ROM, DVD, BD, HD DVD, etc., that stores the executable.
Hence, there exists a need for current software licensing scheme to apply the fully
memorizable private key for higher security and mobility, as well as to add more
information using multihash signature scheme, and to have extra optional security
protection to the software product ID key by using the fragile watermarking scheme.
10.3.2 The Proposed MePKC Appliacation 9.1(vi)
The sixth application 9.1(vi) of the present invention in applying the created
big memorizable secret is a method and system to license software (Manoharan &
Wu, 2007) electronically over a remote network using MePKC, CSPRBG, lossless
data compression, as well as information-hiding techniques like steganography and
fragile watermarking, as in Figures 10.6-10.8 and called triple-watermark digital
software license method and system. Ethics, self-discipline, and education are mostly
needed to fight against the software piracy (Limayem, Khalifa & Chin, 2004).
There are three watermarks in the digital software license. The first
watermark marks the information of software licensing vendor, reseller (or sales
agent), and reseller' s account signed by a vendor. The second watermark marks the
information of licensee and license selling price signed by a reseller. The third
watermark marks the software license status after processed by the vendor like
granted, upgraded, resold, void, withdrawn, evaluation, transferred, etc.
To save the image size, lossless image compression nle format like PNG
(Portable Network Graphics) and TIFF (Tagged Image File Format) shall be used
besides BMP (Bitmap file format). Moreover, the digital software license can also be
173
text data type. Also, this method and system can be modified and applied in other
fields like digital cheque.
2800
Xpreeli Enterprise
Kampar, Perak, Malaysia
Email: kokwah@xpreeli.com
License No.: ABC123 Signee's Name: Kok-Wah Lee
IC/Passport: MY1234567S90
Email: kokwoh@xpreeli.com
Figure 10.6a Blank software license issued by software vendor to reseller
2801
Xpreeli Enterprise License No.: ABC123 Signee's Name: Kok-Wah Lee
Kampar, Perak, Malaysia IC/Passport: MY1234 56 7 S90
Email: kokwah@xpreeli.com Email: kokwoh@xpreeli.com
Licensee's Name: Xpree Jinhua Li Date - 24 June 2008
IC/Passport: MY1 234567891
Email: xpreee@gmail.com AmOUlltl MYR$1 000-00
A license copy of MobileECC 1.2 software.
Figure 10.6b Written software license signed by reseller (or sales agent)
2802
Xpreeli Enterprise License No.
Kampar, Perak, Malaysia
Email: kokwah@xpreeli.com
Licensee's Name: Xpree Jinhua Li
IC/Passport: MY1 234567891
Email: xpreee@gmail.com
A license copy of MobileECC 1.2 software.
ABC123 Signee's Name: Kok-Wah Lee
IC/Passport: MY1234567S90
Email: kokwah@xpreeli.com
Date: 24 June 2008
Amount: MYRS1 000-00
Figure 10.6c Processed software license by vendor
Figure 10.6 Samples of digital software license in triple-watermark digital software
license scheme
174
2900
\レ
Required components for a digital software licensing method and system:
(1) Symmetric and asymmetric watermarking systems
(2) Asymmetric key cryptosystem like 512-bit MePKC operating on ECC
(3) CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator)
(4) Lossless multimedia data compression like BMP, PNG, and TIFF for image
N レ
Key exchange for a shared symmetric WM key K WM between reseller and vendor:
(1) Reseller creates K WM using a username, random number R, and reseller's
private key K ptel
K W m Sign ( Hash (Username II R) , K ptel )
(2) Reseller sends the K WM to vendor using a key exchange protocol like MePKC
N レ
Software vendor preparing blank software license for reseller or sales agent:
(1) Vendor writes the vendor (name, email, etc.), reseller (name, IC/passport,
email, etc.), and license number in a blank PNG image file as in Figure 28a
(2) For the partial image portion 2800a, hash it and then sign the hash using
vendor's private key K pte0 to produce signature S
So ᅳ— Sign ( Hash (Image Portion 2800a) , K pte0 )
(3) Vendor embeds S as first watermark WM to the top band oi image portion
2500c in red using K WM to select pixel address locations for WM embedding
as in Figure 23, where K WM acts uke the stego-key
(4) Other remaining pixel locations in the red band are filled with random bits
(5) Vendor sends the prepared blank software license SLC 2800 to a reseller
V
Reseller or sales agent veriiying, writing and signing a digital software license:
(1) Reseller verifies WM of SLC using K WM and vendor's public key K pub0
(2) If WM is verified, reseller writes the licensee (name, IC/passport, email,
etc.), payment, and date to create image portion 2801b as in Figure 28b
(3) For the partial image portions 2801a and 2801b, hash them and then sign the
hash using reseller's private key K ptel to produce signature Si
Si Sign ( Hash (Image Portion 2801a II Image Portion 2801b) , K ptel )
(4) Reseller embeds Si as second watermark WMi to the middle band oi image
portion 2801c in green using K WM to select pixel address locations for WMi
embedding as in Figure 23, where K WM acts like the stego-key again
(5) Other remaining pixel locations in the green band are filled with random bits
(6) Reseller sends written and signed SLCi to licensee via MePKC
Figure 10.7 Creation of blank software license by a vendor and written software
license by a reseller in the triple-watermark digital software license method and
system
175
〜雇
2902
2904
/XT'
From 2904
V
Licensee's endorsement actions in a digital software license method and system:
(1) Licensee uses MePKC encryption scheme to decrypt the received digital
software license SLCi from reseller
(2) Licensee uses MePKC digital signature scheme to verify the integrity of SLC
(3) If SLCi is verified, licensee sends SLCi to software vendor or licensor
(4) If not software licensing vendor (SLV), other vendor routes SLCi to SLV
V
SLV vendor processing written software license SLCi for reseller and licensee:
(1) Vendor verifies WMi of SLCi using K WM and reseller's public key K publ
(2) If WMi is verified, vendor obtains reseller's signature Si for an endorsement
(3) Vendor uses multihash signature to sign the image portion 2802d using
vendor's private key K pte0 for an object-designated status of processed
software license like granted, upgraded, resold, void, withdrawn, evaluation,
transferred, etc., and then to produce signature S 2
S 2 Multihash Signature ( Hash (Image Portion 2802d) , K pte0 )
(4) Vendor embeds S 2 as third watermark WM 2 to the bottom band of image
portion 2802c in blue using vendor's asymmetric WM private key K WM , pte or
published symmetric WM key K WM2 to select pixel address locations for WM 2
embedding as in Figure 23, where K WM , pte or K WM2 may also act like stego-key
(5) Other remaining pixel locations in the blue band are filled with random bits
(6) Vendor debits the reseller's account for the sold software license
(7) Vendor records the licensee's information for this software license
(8) Vendor sends processed license SLC 2 to reseller and licensee via MePKC
V
Reseller or sales agent veriiying the processed digital software license SLC 2 :
(1) Reseller verifies WM 2 of CHQ 2 using vendor's asymmetric watermarking
public key K WM , pU b or published K WM2 , and vendor's public key Kp Ub0
(2) If WM 2 is verified, reseller checks the account for the debit transaction
(3) Otherwise if WM 2 is rejected, reseller reports to the vendor for investigation
Licensee verifying the processed digital software license SLC 2 :
(1) Licensee verifies WM 2 of SLC 2 using vendor's asymmetric watermarking
public key K WM , pU b or published K WM2 , and vendor's public key K pub0
(2) If WM 2 is verified, licensee checks one's licensing record at vendor's website
(3) Otherwise if WM 2 is rejected, licensee reports to the vendor for investigation
Figure 10.8 Endorsement process of a software license by a licensee in the triple-
watermark digital software license method and system
176
〜誦
〜蓮
/-^ 3002
/ 싀 扁
CHAPTER 11 APPLICATIONS OF BIG SECRET & MePKC
(PART 3)
11.1 MePKC Human-Computer and Human-Human Authentication Schemes
11.1.1 Related Works: Computer Password Authentication Protocol
In this networked info-computer age, computer-computer mutual
authentication uses asymmetric key cryptography, but human-computer and human-
human mutual authentications till now still stick to symmetric key cryptography. In
fact, the most frequently used application of secret is authentication access of a
human to a computer for online account access. The online computer authentication
methods (Beutelspacher, 1994) using password the secret include (i) simple
transmission of key, (uj transmission of encrypted key, (m) transmission of key
through encrypted channels, (iv) hash-based challenge-response method, (v) zero-
knowledge password proof, and (vi) PAKE (Password- Authenticated Key Exchange).
All of these six methods are based on a shared secret between a user and the server.
The first method using simple transmission of key in the clear channel is an
insecure approach. The second method using transmission of encrypted key is in fact
firstly proposed by H. Feistel (1974a, 1974b, 1974c) in his three patents, US Patents:
US3798359 "Block Cipher Cryptographic System", US3798360 "Step Code
Ciphering System", and US3798605 "Centralized Verification System", filed on the
same day on 30 June 1971. For the third method using transmission of key through
encrypted channels, the encrypted channels are based on the protocols like SSL
(Secure Sockets Layer) or TLS (Transport Layer Security). Later, hash function is
created and subsequently the fourth method called hash-based challenge-response
method using hashed password, where a server stores the hash value of a password.
The second, third, and fourth methods remain as the current most popular online
computer authentication methods till today.
For the fifth method called zero-knowledge password proof, it is more
complicated where a secret owner can prove to a verifier its ownership of a secret
without revealing the secret. The fifth method is somehow modified to become the
177
sixth method called PAKE. Examples of PAKE include EKE (Encrypted Key
Exchange), PAK (Password- Authenticated Key exchange), PPK (Password-
Protected Key exchange), SPEKE (Simple Password Exponential Key Exchange)
(Jablon, 2006), SRP-6 (Simple Remote Password Protocol version 6) (Wu, 2003), etc.
For a good computer password authentication protocol, there are three main
issues to be fulfilled: Resistance to dictionary attack, (perfect) forward secrecy, and
non-plaintext equivalence. Forward secrecy means resistance to compromise secret
information if another part of the protocol is compromised. Perfect forward secrecy
means the compromise of long-term key used to derive an agreed ephemeral key
does not compromise the agreed keys from earlier runs. Non-plaintext equivalence
means a data that cannot be used to gain the same access level of a key/password.
Computer password authentication protocols that can resist dictionary attack
are EKE (Encrypted Key Exchange) family of protocols and a few public-key
assisted protocols. Protocols that can fulfill the conditions of resistance to dictionary
attack and prefect forward secrecy are the strongest members of EKE family of
protocols like DH-EKE (Diffie-Hellman Encrypted Key Exchange) and SPEKE
(Simple Password Exponential Key Exchange). SPEKE was firstly proposed by D. P.
Jablon (2004) in US Patent: US7010692 "Cryptographic Methods for Remote
Authentication". For protocol that can fulfil all the three issues of resistance to
dictionary attack, prefect forward secrecy, and non-plaintext equivalence, there is
currently only one called SRP-6 (Simple Remote Password Protocol version 6). SRP
was firstly proposed by T. J. Wu (1998) in US Patent: US6539479 "System and
Method for Securely Logging onto a Remotely Located Computer".
Nevertheless, the PAKE of SRP-6 still has a long-term shared secret and is
not yet a fully asymmetric key crypto system. Hence, if the long-term shared secret is
re-used, SRP-6 is subject to malicious server attack, where the faulty server having
the username, salt, and verifier can pretend to be the another actual server using the
same secret. Moreover, it is lacking of mutual authentication. As compared with the
MePKC authentication methods and systems in the preferred embodiment of this
thesis, SRP-6 also has more rounds of message exchange, more IP packets and
longer processing time.
178
For authentication protocol operating on the platform of asymmetric key
crypto system, split private key crypto system has a few protocols for these purposes.
However, the private key of split private key crypto system is only partially
memorizable and another portion of private key is stored in the authentication server.
The weakness of split private key crypto system is a malicious authentication server
can launch guessing attack and dictionary attack over the first portion of
memorizable split private key. Hence, there exists a need to have a password
authentication protocol for human-computer and human- human interfaces that
operates on the asymmetric key crypto system using a fully memorizable private key
for each user.
11.1.2 First Model without Perfect Forward Secrecy
Yet in the seventh application 9.1(vii) of the present invention in applying the
created big memorizable secret, two MePKC human-computer and human- human
authentication schemes between a human user and a local computer or remote server
(or human user) over an insecure computer communication network are presented.
Challenge-response authentication protocol is adopted for these authentication
schemes without any shared secret and transmission of secret key over the insecure
channel. The challenge has a nonce to resist replay attack. Nonce stands for "number
used once" and may be a one-time random number, counter, or time stamp. Yet one
of many advantages is no storage of encrypted password, hashed password, verifier,
or shared secret in the local or remote computing system. Subsequently, this MePKC
authentication scheme can also resist phishing attack and spoofing attack that try to
steal user password.
Since there is no storage of password, system and network administrators will
no longer know the secret of any user's key. This allows a user to use the same
asymmetric key pair for different offline/online accounts. By sharing the same
asymmetric key pair among different accounts, the memorizability of a user is
improved, and hence there is no more need to jot down various keys in the notebook.
Since there is no encrypted password, hashed password, or verifier, the pre-
computation attack can be avoided. Other attacks such as guessing attack, dictionary
179
attack, and brute force attack will still be possible. However, guessing attack and
dictionary attack can be avoided if the 2D key, multilingual key, multi-tier geo-
image key, or multi-factor multimedia key is used properly as for the key style of
ASCII art and Unicode art. If the same asymmetric key pair is used together with
multihash key to create different slave keys for different online accounts, this allows
pseudo-one-set password entry to multiple websites without having password
domino cracking effect as in the symmetric key crypto systems.
However, the disadvantage of MePKC authentication schemes is the slow
processing speed of PKC. Hence, the size of challenge message has to be limited to
only a few units of encryption block of PKC, like block size of 256 to 512 bits for
256- to 512-bit MePKC, respectively. A wonderful authentication scheme over a
computer communication network shall have the features of non-plaintext
equivalence, prefect forward secrecy, and resistance to dictionary attack.
For the first basic model of the MePKC authentication scheme as in Figures
1 1.1-1 1.2, it has the features of non-plaintext equivalence internally and resistance to
dictionary attack externally by using secret creation method of 2D key, multilingual
key, multi-tier geo-image key, or multi-factor multimedia key. The first basic model
is still lacking of the feature of prefect forward secrecy, because the compromise of
long-term private key used to derive an agreed ephemeral key does compromise the
agreed keys from earlier runs.
11.1.3 Second Model with Perfect Forward Secrecy
To include the feature of prefect forward secrecy, the second model of
MePKC authentication scheme as in Figures 11.3-11.5 is innovated. Now, a human
user may use multihash key and has a long-term asymmetric key pair [K pte uL , K pubU L]
and a one-time asymmetric key pair [K pte u , K pub u] acting as rolling key for each
login or authentication access. Now, the compromise of long-term private key used
to derive an agreed ephemeral key does not compromise the agreed keys from earlier
runs. An added feature for this second model is the optional inclusion of a key
exchange scheme to establish a shared key between the human user and remote
server.
180
From 101
Creating a human user's private key with sufficient key entropy for n-bit MePKC:
(1) User U creates a big memorizable user's private key K pteU with entropy E K
from Box 101
(2) If E K < n, then go to 100 again to create another K pteU as in Box 101
(3) Else if E K > n, then generate user's public key K pubU using K pteU
Kp UbU Public Key Generation (K pte u)
/X 기
3100
Figure 丄 1.1a Creating a sufficiently big and yet memorizable user's private key
From 3100
V
New human user registering an offline/online account for authentication access:
(1) User U accesses a local computer system S L or remote server S R
(2) User creates and sends a username ID to computer S L or S R
(3) If the ID is unique and availaole, computer S L or S R accepts the ID and
requests for user's public key K pubU ; otherwise user creates another ID
(4) User sends K pubU to computer S L or S R for storage and future authentication
access
Figure 丄 1.1b Account registration of a new user
From 3204 or 3205
V
Human user U changing the registered public key K pubU to new public key K pubu , :
(1) Once getting authentication access from Box 3204 or 3205, user can create a
new user's public key K pubU ' as in Box 3100
(2) User sends K pubU ' to the local computer S L or remote server S R to replace the
old user's public key K pubU for next login
Figure 11.1c Replacing a user's public key by a user
Figure 11.1 Various not- so-frequent operations of the basic model of MePKC
authentication schemes with feature of non-plaintext equivalence
181
3200
\レ
A registered human user U attempting to login to an offline/online account:
(1) User U accesses a local computer system S L or remote server S R
(2) User sends one's registered username ID to computer S L or S R
V
Computer S L or S R creating a challenge C for user to gain authentication access:
(1) Computer S L or S R creates a challenge C using an n-bit random bitstream B,
timestamp T, and a nonce N R
C ^ ( B II T II N R )
(2) Computer S L or S R encrypts the C using user's public key K pubU to produce C E
C E Public Key Encryption ( C , K pubU )
(3) Computer S L or S R sends encrypted challenge C E to the user through SSL
V
User decrypting the encrypted challenge C E to get a response R:
(1) User decrypts the C E using user's private key K pteU to produce response R
R <— Private Key Decryption ( C E , K pteU )
(2) User encrypts the R using public key K pubS of computer S L or server S R to
produce encrypted response R E
R E <— Public Key Encryption ( R , K pubS )
(3) User sends encrypted response R E to the computer S L or S R through SSL
Computer S L or S R decrypting the encrypted response R E to verify user's access:
(1) Computer S L or S R decrypts R E using its private key K pteS to produce R
R <— Private Key Decryption ( R E , K pteS )
(2) If R ^ C, the user's authentication access is rejected, and user's further action
is directed to 3202 for another authentication attempt based on some rules
(3) Otherwise if R = C, the user's authentication access is verified and granted
(4) Computer S L or S R informs the user that user's authentication is successful
V
For mutual authentication in a remote computer communication network, go to
3200, and invert the roles of human user and remote computer S R
Figure 11.2 rirst basic model of MePKC authentication scheme between a human
user and a computer with features of non-plaintext equivalence and optional mutual
authentication
182
〜遍
3202
/XT'
시기 通
〜通
3300
Human user holds a long-term private key K pte uL and published public key K pubUL .
New human user registering an offline/online account for authentication access:
(1) User U accesses a local computer system S L or remote server S R
(2) User creates and sends a username ID to computer S L or S R
(3) If the ID is unique and available, computer S L or S R accepts the ID and
requests for user's public key K pubU ; otherwise user creates another ID
N レ
Creating a human user's authentication private key K pteU with sufficient key
entropy for n-bit MePKC and user's authentication public key K pubU :
(1) User U creates a big memorizable user's secret key K P with entropy E P from
Box 101 and an n-bit salt s from a CSPRBG
(2) If E P < n, user goes to 100 again to create another K p as in Box 101
(3) Else if E K > n, user generates user's private key K pteU and public key K pubU
Kpteu Hash ( K P II ID II 5 ) , K pubU Public Key Generation (K pteU )
(4) User signs the K pubU using K pte uL to produce signature S pub K
SpubK Sign ( Kp U bU , KpteUL )
(5) User sends K pubU , s, and S pub K to computer S L or S R for storage and future
authentication access
(6) Computer S L or S R stores K pubU in ciphertext, as well as s and S pub K in plaintext
Figure 11. Account registration of a new user by creating a sufficiently big and yet
memorizable user's private key
From 3500
V
Human user U changing the registered public key K pubU to new public key K pubu , :
(1) After getting authentication access from Box 3500, user creates new salt s\
user's private key K pteU ' and user's public key K pubU ' as in Box 3302
K^u ' Hash ( K P II ID II ぶ,), K pubU , Public Key Generation (K ptelJ ,)
(2) User signs the K pubU , using K pte uL to produce signature S pub K,
SpubK' ^~ Sign ( Kp U bU ' , KpteUL )
(3) User sends K pubU ,, s\ and S pU bK, to the local computer S L or remote server S R
to replace the old authentication dataset K pubU , s, and S pub K
(4) Computer S L or S R stores K pubU , in ciphertext, as well as s' and S pub K, in
plaintext for next login
Figure 11.3b Replacing a user's authentication dataset like user's public key and salt
by a user
Figure 11.3 Various not- so-frequent operations of the second model of MePKC
authentication schemes with features of non-plaintext equivalence and perfect
forward secrecy
〜遍
ᄉ\71 濯
183
3400
A registered human user U attempting to login to an offline/online account:
1) User accesses a local computer system Sl or remote server Sr
2) User sends one's registered username ID to computer S L or S R
Computer Sl or Sr creating a challenge C for user to gain authentication access:
1) Computer S L or S R looks up the corresponding K pubU , ん and S pub K of username ID
2) Computer S L or S R encrypts K pubU using K pubU to produce ciphertext CK pubU
CKp UbU Public Key Encryption ( K pubU , K pubU )
3) Computer S L or S R creates and encrypts a challenge C using an n-bit random bitstream
B, timestamp T, and a nonce Nr
C — ( B II T II N R ) , C E — Public Key Encryption ( C , K pubU )
4) Computer S L or S R signs the concatenation of Si, CK pubU , and C E for integrity checking
using private key of computer or server K pteS to produce signature Ss
S s ― Sign ( Hash ( s, II CK pubU II C E )) ᄂ
5) Computer S L or S R sends S\, CK pubU , C E , and S s to the user through SSL
3401
3402
User decrypting the encrypted challenge Ce to get a response R and shared key K SH :
1) If Ss is rejected, go to 3400; else if Ss is verified, go to step (2) of Box 3403
2) User generates K pteU and then K pubU , and decrypts CK pubU to get K pubU2
K pt eu Hash ( K P II ID II め), K,
-pubU '
Public Key Generation (K pteU )
K pubU2 ― Private Key Decryption ( CK pubU , K pte u )
3) If K pubU + Kp Ub u2 , go to 3400; else if K pubU = K pubU2 , computer S L or server S R is
authenticated and go to step (4) of Box 3403
4) User decrypts the Ce using user's private key K pteU to produce response R
R <— Private Key Decryption ( Ce , K pte u )
5) User creates a shared key K SH with server Sr by hashing R
R = ( B II T II N R ) , K SH ^- Hash (R) ' ᄂ
6) User encrypts the R using public key K pubS of computer Sl or server Sr to produce
encrypted response R E
R E Public Key Encryption ( R , K pubS )
7) User creates new salt s 2 , user's private key K pteU2 , and user's public key K pubU2 as in
Box 3302 '
3403
K,
-pteU2 "
Hash ( K P II ID \\s 2 ), K,
pubU2 "
Public Key Generation (K pteU2 )
8) User signs the K pubU2 using K pteU L to produce signature S pubK2
SpubK2 ᅳ Olgn ( K pubU 2 , KpteUL )
9) User sends R E ,&, Kp UbU2 , and S pub K2 to the computer S L or server S R through SSL
To 3500
Figure 丄 1.4 Second model of MePKc authentication scheme between a human user
and a computer with features of non-plaintext equivalence, perfect forward secrecy,
and optional key exchange scheme (Part 1)
184
3500
V
Computer S L or server S R decrypting the encrypted response R E to verify user's
access and to get a shared key Ks H :
(1) Computer S L or server S R hashes the K pubU2 to get hash value H m
Hui Hash (K pubU2 )
(2) Computer S L or server S R decrypts S pub K2 using K pubUL to get hash value H U2
H U2 Public Key Decryption (S pubK2 , K pubUL )
(3) If Hui ^ H U2 , Sp Ub K2 is rejected, and user's further action is directed to Box
3402 for another authentication attempt based on some rules; else if Hui =
H U2 , S pub K2 is verified, go to step (4) of Box 3501
(4) Computer S L or S R decrypts R E using its private key K pteS to produce R
R Private Key Decryption ( R E , K pteS )
(5) If R ^ C, the user's authentication access is rejected, and user's further action
is directed to Box 3402 for re-authentication attempt based on some rules
(6) Otherwise if R = C, the user's authentication access is verified and granted
(7) Server S R creates a shared key Ks H with human user U by hashing R
R = ( B II T II N R ) , Ks H い Hash (R)
(8) Computer S L or server S R stores K pub u2 in ciphertext, as well as s 2 and S pub K2 in
plaintext for user's next login or authentication access
(9) Computer S L or S R informs the user U that user's authentication and/or key
exchange is successful
V
Human user U and remote server S R can use the shared key Ks H for any
application using secret over an insecure computer communications network
Figure 丄 1.5 Second model of MePKc authentication scheme between a human user
and a computer with features of non-plaintext equivalence, perfect forward secrecy,
and optional key exchange scheme (Part 2)
11.1.4 Re-Authentication Rules
Mutual human-computer authentication for both the first and second models
is possible, and it is also extendable to mutual human- human authentication over a
computer network. For railed authentication, there are some re-authentication rules
for another login attempt and so on. These re-authentication rules include limited
time, limited usage amount of a factor, limited number of allowable attempts per unit
of time, CAPTCHA activation, secret question(s) and answer(s), as well as password
throttling using time, bit length, and crypto system, etc.
〜舊
185
11.2 MePKC Digital Certificate Having More Than One Asymmetric Key
Pair for Different Protection Periods and Password Throttling
11.2.1 Related Works: Digital Certificate and Password Throttling
In using PKC (Public-Key Cryptography), a user needs to bind one's public
key with one's identity. The file binding the user's identity and public key is called
digital certificate (aka public-key certificate). Digital signature is used to bind the
user's identity and public key by an introducer using web of trust or by a trusted third
party (TTP) using certification authority (CA).
In the current prior art, there is only one public key per digital certificate. In
PKC, different key sizes correspondent to different protection periods. A short key
size like RSA-1024 will have to be changed or revoked frequently. Frequent
certificate revocation may cause complicated management problems. Hence, a
private key has to be steady throughout its validity period to avoid frequent
certificate revocation. Successful cracking of encrypted private key, as well as
forgetfulness of symmetric key encrypting the private key and partially memorizable
private key tend to fail this purpose. Therefore, the ciphertext of the encrypted
private key has to be hidden from the public domain.
For online account using split private key crypto system, attackers may launch
online dictionary attack to the server. The method of locking an account after a pre-
set number of unsuccessful login attempts is not practical because it is subject to
denial-of- service attack. The follow-up services to re- activate the account through
phone and face-to-face communications are tedious and costly. Consequently, split
private key crypto system was improved by Sandhu, deSa, and Ganesan (2005a) to
have the function of password throttling using the increasing complexity of time
response and bit length for unsuccessful authentication. The time response will be
slower or the bit length of the challenge will be longer whenever a previous login
attempt is unsuccessful until a maximum pre- set value tolerable by a user. A slight
modification is to measure based on limited number of login attempts per time unit.
The disadvantage of this method is that a digital certificate with short
asymmetric key pair like RSA-1024 will still have to be changed frequently. Another
186
disadvantage is that there is a maximum of time response and processing time like
one second that a user can tolerate. A delay of one second adds only by about 20 bits
on the platform of contemporary computing technologies. Yet in some password
generation systems, key strengthening (aka key stretching) is use to harden a
password by hashing a password seed for many rounds of iteration for a pre- set time
unit like one second to freeze the demand of better computing technologies for
longer key length. It tells that password throttling (Sandhu, deSa & Ganesan, 2005a)
using time response may be not tolerable if it is used together with key strengthening.
Hence, there exists a need to improve this method to have lower frequency of
certificate revocation and yet fast time response. Moreover, there is a need to have
bigger memorizable secret to resist online dictionary attack and malicious server
attack over the split private key crypto system.
Another method to resist machinery online dictionary attack is to use
CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart) by asking a user to key in some data presented by a computer that
cannot be interpreted by another remotely networked computer trying to attack the
account. This method is quite effective but it cannot extend the validity of a digital
certificate with short asymmetric key pair like RSA-1024 that is still changed or
revoked frequently. Hence, need exists to extend the digital certificate validity to
reduce the certificate revocation frequency via a better password throttling method.
11.2.2 MePKC Digital Certificate with Many Asymmetric Key Pairs
Yet in the eighth application 9.1(vm; of the present invention in applying the
created big memorizable secret, the multihash key allows the usages of multiple
secrets for various applications and this can realize the MePKC digital certificate
having more than one asymmetric key pair. Due to technical security and legal
factors, a pair of asymmetric key cannot be re-used for different cryptographic
schemes like encryption, signature, and authentication. Hence, it is very common for
a user to own more than one asymmetric key pair. Here, MePKC digital certificate
with four public keys is illustrated in Figure 11.6 for one of its various functions
according to private key sizes, protection periods, and difficulty levels of cracking.
187
3600
V
Types of asymmetric key pair in an n-bit MePKC digital certificate having four public
keys for various applications, such as password throttling:
(1) 160-bit MePKC: 160-bit memorizable private key, or private key from a multi-factor
key of 80-bit memorizable secret and 160-bit software token
(2) 256-bit MePKC: 256-bit memorizable private key, or private key from a multi-factor
key of 128-bit memorizable secret and 256-bit software token
(3) 384-bit MePKC: 384-bit memorizable private key, or private key from a multi-factor
key of 192-bit memorizable secret and 384-bit software token
(4) 5 12-bit MePKC: 512-bit memorizable private key, or private key from a multi-factor
key of 256-bit memorizable secret and 512-bit software token
3601
Different n-bit asymmetric key pairs for different cryptographic applications based on
different protection periods or difficulty levels of cracking:
(1) 160-bit MePKC: 5 -year protection or till year 2010 or use key stretching to freeze the
quest for longer key length
(2) 256-bit MePKC: 30-year protection
(3) 384-bit MePKC: 150-year protection
(4) 5 12-bit MePKC: 300-year protection or resistance to future quantum computer attack
/ 싀
3602
\レ
Password throttling using different MePKC cryptosystems based on different difficulty
levels of cracking for re-authentication rules after failed login attempt as in Boxes 3204
and 3501 in MePKC authentication schemes:
(1) For the first 2 4 re-authentication attempts, 160-bit MePKC or higher level without
request for CAPTCHA
(2) For the second 2 6 re-authentication attempts, 160-bit MePKC or higher level with
request for CAPTCHA ᄂ
(3) For the third 2 6 re-authentication attempts, 256-bit MePKC or higher level with
request for CAPTCHA ᄂ
(4) For the fourth 2 re-authentication attempts, 384-bit MePKC or higher level with
request for CAPTCHA
(5) For the fifth 2 6 re-authentication attempts within a period t, 512-bit MePKC or higher
level with request for CAPTCHA
(6) If more than the fifth 2 6 re-authentication attempts within period t, resort to symmetric
key cryptosystem and secret Q&A sessions, or a phone/face-to-face authentication
(7) Otherwise if more than the fifth 2 6 re-authentication attempts and outside period t, go
to step (5) of Box 3603
(8) If a user succeeds in at least one re-authentication attempt, system access is granted
3603
Figure 丄 1.6 MePKC digital certificate with four public keys for various applications.
such as password throttling
188
The illustrated public key settings of a MePKC digital certificate are 160, 256.
384, and 512 bits, in which their private keys may be created from multi-factor
multilingual key. For re-authentication rules after failed login attempts, password
throttling based on crypto system is presented as one of its potential main functions.
Other password throttling techniques use different periods of response time and
lengths of challenge message. After series of password throttling, the authentication
scheme may resort to symmetric key crypto system and secret Q&A (Questions and
Answers) session for limited information access, or phone/face-to-face authentication
to re- activate the account. Another potential function is to let the MePKC digital
certificate to have at least a bait asymmetric key pair. This bait will detect if there is
any criminal crony interested with any MePKC digital certificate.
11.3 Three-Tier MePKC Digital Certificates for Ladder Authentication
11.3.1 Related Works: Digital Certificate and Ladder Authentication
For Internet banking using password the secret for authentication access,
usually more than one factor and one authentication process are needed for different
services due to the sensitiveness and critic ality of monetary matters. For instance, a
first symmetric key through computer communications network is needed to login to
an Internet banking account. A second random number the secret, that is sent from a
bank server to a user's mobile phone through another communication channel, is
needed to activate some financial services like fund transfer and utility bill payment,
as well as non-financial services like changes of mailing address, email, and phone
number. These different authentication processes for different sensitive services of an
account is called ladder authentication (Sandhu, deSa & Ganesan, 2006e).
Although this method is effective, it limits to users' with mobile phone and
the costs of SMS (Short Message Service) to deliver the random number can be quite
a large amount when the Internet banking is prevalent. For example in Malaysia,
there are a population of 27 million and an average household size of five members
per family in 2007. Let each household have five types of utility bills per month:
Water, electricity, one wired phone, and two wireless phones. Then, there are 27
189
million bills per month throughout Malaysia. If an SMS is charged one cent by the
services provider of mobile phone, then it is MYR$3.24 million annually.
The operating costs become higher if a mobile phone is registered overseas.
This is a norm of phenomenon for a Malaysian using Singapore Internet banking
services, and vice versa. To solve this problem in Singapore, where lots of its
residents are occasionally residing overseas, Singapore banks use the one-time-
password token (OTP token) like RSA SecurlD token. The seeded OTP token creates
temporary password with a finite usable life such as thirty seconds. For every cycle
of usable life, another temporary password is generated. An authentication server
knows the seed and each usable temporary password as well as its usable life, based
upon shared algorithms with the OTP token. An overseas user uses the temporary
password from the OTP token to replace the random number of an SMS.
Nevertheless, the OTP token is subject to loss, damage, and mobility
convenience. Bank will charge the users for replacement of an OTP token due to loss
or damage. Currently in Singapore, the replacement cost is SGD$20 per unit of OTP
token. Moreover, the temporary password of OTP token is displayed in plaintext
mode. Anyone who gets the OTP token can subsequently obtain the temporary
password. In a summary, in the current prior art, the ladder authentication methods
using SMS of mobile phone and OTP token incur a high operating cost. Hence, there
is a need to apply specific PKC digital certificate using fully memorizable private
key to implement a cost- saving and yet securer ladder authentication system.
11.3.2 Three-Tier MePKC Digital Certificates for Various Applications
In the ninth application 9.1(ix) of the present invention in applying the
created big memorizable secret, three-tier MePKC digital certificates can perform the
functions of persistent private key, rolling private key, and ladder authentication as in
Figure 11.7. The number of tier can also be other values depending on the design
requirements. The first group at the first tier acts as the introducer or endorser for the
other groups. The user information of the digital certificates in the second and third
groups can be updated easily from time to time.
190
3700
V
Group types of three-tier MePKC digital certificates for various applications,
such as persistent private key, rolling private key, and ladder authentication:
(1) First group at the first tier Gi : Acting as certification authority, introducer or
endorser of web of trust for the second and third groups of three-tier MePKC
digital certificate
(2) Second group at the second tier G 2 : Two subgroups for non-persistent and
persistent private keys with optional feature of rolling private key K R using the
update of salt
Kg2 <— K R <— Hash ( Master Key II Username ID II salt ) or
Kg2 ^ K R ^- Hash ( Multihash Key (Master Key II Username ID) , salt )
(2.1) First subgroup of second group G 2 si : Non-persistent private key for
ephemeral or transient usages like one-time authentication
(2.2) Second subgroup of second group G 2 s2 : Persistent private key within
limited time, limited number, or limited number per time unit, for steady
usages like fund transfer
(2.2.1) Sub-subgroups of second subgroup of second group, G 2 s2si, G 2 s2S2, ''.,
G 2 s2Sn : For ladder authentication, where different sub-subgroups are given
rights to access, manage, modify, endorse, delete, etc., different set of info
(3) Third group at the third tier G 3 : For highest security level, where the private
key in this group is only created and used when the network access of the
computer is disconnected
(4) Each group may be digital certificate with one or more asymmetric key pairs
An example of using three-tier MePKC digital certificate in Internet banking:
(1) Use multihash key to create multiple memorizable private keys for different
groups of three-tier MePKC digital certificate
(2) The public key in Gi is signed by a trusted third party being a certification
authority or introducer of web of trust to become a digital certificate
(3) Private key in Gi is used to sign and endorse other public keys in the second
and third groups
(4) Private key in G 2 si is used for one-time authentication access to the website
(5) Private key in G 2S2S1 is used to access and manage first group of information
like changing personal particulars
(6) Private key in G 2 s2S2 is used to access and manage second group of
information like fund transfer
(7) Private key in G 2 s2s n is used to access and manage n-th group of information
(8) Private key in G 3 is used for highest security when network is disconnected
like fund transfer more than a preset amount to a third party
3702
Figure 1 1.7 Three-tier MePKC digital certificates for various applications, such as
persistent private key, rolling private key, and ladder authentication
191
The second group has two subgroups with the optional feature of rolling
private key, which means regular replacement of asymmetric key pair. Each rolling
private key is updated when the salt value is updated according to one of the two
equations, where the first equation is from the second model of the MePKC
authentication scheme as in Figures 11.3-11.5, and the second equation applies the
multihash key.
For the private key in the first subgroup of the second group, it is non-
persistent in computer memory for ephemeral or transient usages like one-time
authentication. For the private key in the second subgroup of the second group, it is
persistent in computer memory within limited time, limited number, or limited
number per time unit, for steady usages like changing personal particulars, fund
transfer and bill payment.
The second subgroup of second group can be further divided into many sub-
subgroups for ladder authentication to resist MITM (Man-In- The-Middle) attacks.
The private key in the first, second, third, ..., n-th sub-subgroups of the second
subgroup of the second group may be used to independently access, manage, modify,
endorse, delete, etc., first, second, third, ..., n-th groups of information, respectively.
The first and second groups can function to alternate and complement the
current prior art of authentication scheme in Internet banking, where first
authentication using password, and second authentication using SMS random
number or one-time-password token (OTP token). This SMS random number is
called specifically as TAC (Transaction Authorisation Code or Transaction
Authentication Code), TAP (Transaction Authorization Pin), Auth Code, and
Authorization Code in Internet banking as a second layer of protection. The ladder
authentication using different groups from different tiers of MePKC digital
certificate can be applied to Internet banking, as well as online share trading.
For highest security, the private key of the third group is only used when the
networked computer is offline or disconnected from the computer communications
network like Internet and LAN. When anonymity feature is needed, then at least an
additional set of MePKC digital certificate from the first, second, and/or third group
is needed.
192
11.4 Anti-Phishing Using MePKC Authentication Schemes
According to APWG (Anti-Phishing Working Group) (2008), the numbers of
crimew are- spreading URLs infecting PCs with password-stealing code rose 93% in
2008 Ql to 6500 sites, nearly double the previous high of November, 2007, and an
increase of 337 percent from the number detected end of 2007 Ql. Patel and Luo
(2007) took a closer look at phishing, which is a serious crime for the Internet
banking (Hilley, 2006; Mannan & van Oorschot, 2007).
Lately, Microsoft has declared war against the phishing (Hunter, 2006) by
taking actions like recruiting the anti-phishing crusader (CastleCops, No date;
McMillan, 2008a). There is also some key management tools to resist the phishing
attack like Passpet (Yee & Sitaker, 2006).
Here, it is to note that when the seventh to ninth applications 9.1(vii)-9.1(ix)
of the present invention in applying the created big memorizable secret are applied
for authentication to access online accounts like Internet banking and online share
trading, the phishing attack can be thwarted easily since there are no shared secret at
all and no transmission of secret key between the human and computer over an
insecure computer communications network (Ford, 1994).
193
CHAPTER 12 APPLICATIONS OF BIG SECRET & MePKC
(PART 4)
12.1 Archiving the Voice/Video Calls of Wired/Wireless Phones
12.1.1 Related Works
Yet there is another important application of PKC (Public-Key Cryptography)
using fully big memorizaole secret. Here, the application of secret to mobile phone
(aka wireless phone, cellular phone, cell phone, and hand phone) (Lee, 1995) is
discussed. Since the invention of wireless telephone in the 1907 by Nathan B.
Stubblefield (1908) in the US Patent: 887357 "Wireless Telephone", filed on 5 April
1907, its number of functions keeps on increasing until now that even there is camera
capturing real-time image and making video call a reality.
One of the many inventions is by Charles A. Glaaden and Martin H.
Parelman (1979) entitled "Rapidly Deployable Emergencey Communication System"
and to introduce the concepts of frequency reuse and handoff. For mobile phone, it is
possible to record SMS, voice mail, local image and video. A user needs a passcode
(aka pin) the secret to access the voice mailbox. However, it is yet impossible to
download voice mail from a website and record interactive voice and video calls.
Moreover, the memory of mobile phone is limited due to its size and publicly
affordable selling price.
Nevertheless, there are commercial activities, legal cases, personal matters,
etc., that are constrained by physical distance and the most convenient
communications channel is a phone connection. Here, normally a wired phone will
be used together with a recorder to keep a copy of the conversation contents as
electronic evidence. However, having every household to own a phone recorder is
not cost-effective.
Hence, there exist needs to download voice mail from a website, as well as to
record, encrypt, store, access, manage, copy, download, and decrypt the interactive
voice and video calls from a website as electronic evidence. Distributed servers
located in the CO (Central Office) (aka telephone exchange) of wired phone and
194
MTSO (Mobile Telephone Switching Office) (DeVaney, Harper & Short, 1987) of
wireless phone shall be fully utilized for recording storage of voice and video calls.
Computer password authentication protocol using symmetric key crypto system, PKC,
or MePKC shall be used to access, manage, and download the recorded voice mail,
voice and video calls.
12.1.2 The Proposed Model
In the tenth application 9.1(x) of the present invention in applying the created
big memorizaole secret, MePKC authentication scheme is used to access a user
online account storing the recorded data like voice mail, voice call, and video call of
wired phone (aka wireline phone) and wireless phone (aka handphone, mobile phone,
wireless phone, cellular phone, cell phone) as in Figure 12.1.
A user's handphone has two buttons to select the call modes. For calling user,
if a first button is pressed, then a voice/ video session will be recorded and stored at
the distributed server. For called user, if the first button is pressed, the voice/video
call will be diverted to recording mode directly without receiving the call. Otherwise
if second button is pressed, the voice/video call of called user is received and there is
interaction between the calling and called users.
After the second button has been pressed, if the first button of called user is
not pressed until the end of a call, then no data will be recorded. Otherwise if the first
button of called user is pressed after the second button has been pressed, then the
following communicated data like voice, image, and video is recorded, encrypted,
and stored. Yet calling and called users may press the third and fourth buttons
accordingly to pause or terminate a recording session.
The distributed servers at the CO (Central Office) of PSTN (Public Switched
Telephone Network) of wired phone and/or CM (Communication Management) of
MTSO (Mobile Telecommunications Switching Office) of wireless phone records,
encrypts using MePKC, and stores the communicated voice/video call between the
calling and called parties. The voice/ video data is named, encrypted using MePK ᄂ,
and saved into the user account.
195
3800
\レ
Method and system to record, encrypt, and store the voice mail, voice call, and
video call in the distributed servers at the CO (Central Office) of PSTN (Public
Switched Telephone Network) of wired phone (aka wireline phone) and/or CM
(Communication Management) of MTSO (Mobile Telecommunications
Switching Office) of wireless phone (aka mobile phone, cellular phone):
(1) Calling user Ui may press a first button to record the voice/video session
(2) When called user U 2 receives a voice/video call, U 2 presses 1 of 2 buttons:
- First button to divert the call for recording storage without receiving the call
- Second button to receive the call without recording storage
(3) If first button is pressed, the distributed servers at the CO of wireline phone
and/or CM of wireless phone record, encrypt, and store call data Di
(4) Data Di is named, encrypted, and stored using MePKC into user LPs account;
(5) Else if second button is pressed, the user U 2 may later press the first button to
record the voice/video call
(6) If first button is not pressed after the second button has been pressed until the
end of the voice/video call, then no data will be recorded and stored;
(7) Else if first button is pressed after the second button has been pressed before
the end of the voice/video call, then distributed servers at CO of wireline
phone and/or CM of wireless phone will record and store the communicated
call data D 2
(8) Users Ui and U 2 may press the third and fourth buttons accordingly to pause
or terminate a recording session
(9) Data D 2 is named, encrypted, and stored using MePKC into user LPs account
3801
Method and system to access, download, and decrypt the recorded and stored data
of voice mail, voice call, and video call from the distributed servers at the CO
(Central Office) of PSTN (Public Switched Telephone Network) of wireline
phone and/or CM (Communication Management) of MTSO (Mobile
Telecommunications Switching Office) of wireless phone:
(1) User Ui or U 2 surfs the Internet website of the wired phone or wireless phone
services provider
(2) User authenticates oneself to access one's account in the distributed server at
CO of wireline phone and/or CM of wireless phone using any authentication
scheme like MePKC authentication scheme, SRP-6, etc.
(3) User searches and manages one's recorded data, Di and/or D 2 , like voice mail,
voice call and video call
(4) User downloads selected data, Di and/or D 2 , then decrypts at local computer
(5) User may select to subscribe to larger storehouse by paying more
(6) User logouts after all the transactions have been done
Figure 12.1 Operations to record, store, access, manage, and download the voice mail,
voice call, and video call in the distributed servers at the CO of PSTN of wireline
phone and/or CM of MTSO of wireless phone
196
The user can then surr the website of the wired phone and wireless phone
services provider to access one's account using MePKC authentication scheme or
other methods. Upon gaining access to the user account, the user may be optionally
required to gain a MePKC ladder authentication to further manage and download the
recorded and stored voice mail, voice call, and video call.
After downloading the encrypted data to a local computer, the user can
decrypt the data using MePKC schemes like hybrid encryption scheme of PKC and
symmetric key cryptography, where a symmetric key used to encrypt the voice/video
call is encrypted by a public key. Likewise, this method can be extended to other
online electronic data storage using MePKC authentication scheme.
12.2 Multipartite Electronic Commerce Transactions Using MePKC
12.2.1 Related Works
And yet there is crucial crypto system using secret to be improved soonest
possible. This crypto system is the current prevalent electronic commerce (aka e-
commerce) transactions (Kini & Choobineh, 1998; Konrad, Fuchs & Barthel, 1999;
Ahuja, 2000; H. M. Deitel, P. J. Deitel & Nieto, 2001; Ford & Baum, 2001; Kang,
Park & Koo, 2003; Lee, 2006a). In the current prior art, the electronic commerce
transactions operate in series of bipartite communication mode using credit card and
password the secret.
Once a user has selected a list of products to be purchased online at a certain
website (H. M. Deitel, P. J. Deitel & Nieto, 2000), normally a credit card, such like
MasterCard or VISA, is then used to pay the bill, by sending the credit card number
and an optional secure code benind the card to the online merchant. For more
security, password the secret protecting the credit card may be requested by some
merchants. Examples of the services providers of credit card password are PayPal,
MasterCard SecureCode, and Verified by VISA. Graefe, Lashley, Guimaraes,
Guodabia, Gupta, Henry, and Austin (2007) discussed on the credit card transaction
security.
197
Besides merchant and credit card verifier for password, sometimes there
exists online loyalty point website demanding for another password authentication.
Hence, there are at least three rounds of bipartite communications for different stages
of authentication. In fact, a comprehensive electronic commerce transaction involves
many other entities such as merchant's bank, customer's bank, insurance company,
various departments of local, state, and federal governments, transportation agent,
storehouse agent, and so on. Each of this entity is now either usually paired with
merchant or rarely customer to one round of bipartite communication to initiate and
endorse a sub-process of an electronic commerce transaction.
Here, it can be observed that every individual round of bipartite
communications using token of credit card number and/or secret of a symmetric key
is not so secure and effective. It is in fact quite redundant and time-wasting. The
nature of an electronic commerce transaction is in fact a multipartite communication.
In dealing with cryptography and multipartite communications, there is a
branch of knowledge called BGP (Byzantine Generals Problem) (Lamport, Shostak
& Pease, 1982; Fischer & Lynch, 1982; Lamport, 1983; Aguilera & Toueg, 1999;
Pathak & Iftode, 2006). BGP involves a group of entities where loyal entities have to
reach a common agreement called BA (Byzantine Agreement) (Pease, Shostak &
Lamport, 1980; Yan & Chin, 1988; Meyer & Pradhan, 1991; Yan, Chin & Wang,
1992; Siu, Chin & Yang, 1998a, 1998b; Yan, Wang & Chin, 1999; Yan & Wang,
2005b; Fitzi & Hirt, 2006) at the end of a sufficient round of message exchanges,
regardless of the malicious and arbitrary messages communicated by faulty entities.
The solution of BGP is known as BAP (Byzantine Agreement Protocol), in
which BA can be successfully achieved based on the provided functions of PKC
(Public-Key Cryptography) like access control, authentication, non-repudiation, and
integrity. However, PKC popularity has to be boosted up by using fully big
memorizable secret to realize the MePKC. Faulty node detection and identification
are also needed (Wang & Yan, 2000; Yan & Wang, 2005a).
There are various types of available BAP. For the entities of electronic
commerce, they can be basically partitioned into three groups: Essential, government,
and non-essential groups. Here, there is a BAP also optimally divides a network of
198
entities into three partitions. This specific BAP is called tripartite ANN based BAP
(Tripartite Artificial Neural Network Based BAP) (aka Tripartite BAP-ANN or
Tripartite BAP with ANN) (Lee & Ewe, 2003) and developed from ANN based BAP
(Wang & Kao, 2001; Lee & Ewe, 2001, 2002, 2007b, 2007c; Lee, 2003).
The ANN here functions as a classifier and provides majority function over
rows and columns of MEM (Message Exchange Matrix) formed from three message
exchange rounds of Byzantine communications. For more details of ANN based
BAP and tripartite ANN based BAP, please refer to a master's thesis published on 25
October 2002 at Multimedia University, Malaysia, entitled "Artificial Neural
Network Based Byzantine Agreement Protocol" by Kok-Wah Lee @ Xpree Jinhua
Li (2003).
For the functioning, implementation, and optimization of ANN (Artificial
Neural Network), these literatures (Jacobs, 1988; Nguyen & Widrow, 1989, 1990;
Cooke & Lebby, 1998; Haykin, 1999) can be referred.
Again to emphasize here, e-commerce transaction involves multipartite
communications by nature and not many rounds of bipartite communications. The
BGP can model this multipartite cryptography problem of electronic commerce. BAP
is the solution of BGP, and hence multipartite communications of electronic
commerce. Tripartite ANN based BAP is well- suited to a network of e-commerce
entities divided into three groups.
Hence, there exists a need to realize e-commerce transaction based on
multipartite communications of BGP and BAP using MePKC, wherein the main
purposes are to speed up the processing time from many rounds of bipartite
communications and to rely on stronger security protection than the current prior art
using symmetric key cryptography.
12.2.2 Artificial Neural Network Based Byzantine Agreement Protocol (ANN
Based BAP)
In the eleventh application 9.1(xi; of the present invention in applying the
created big memorizable secret, MePKC cryptographic schemes like encryption and
199
signature schemes are used in the method and system of multipartite electronic
commerce (aka e-commerce) transactions using tripartite ANN based BAP (Artificial
Neural Network Based Byzantine Agreement Protocol) (aka tripartite BAP-ANN
(Tripartite BAP with ANN)) as in Figures 12.2-12.7(39-44) and article "Faulty Node
Detection in the Tripartite ANN based BAP" by Kok-Wah Lee and Hong-Tat Ewe
(2003). The MePKC provides the security like confidentiality, integrity,
authentication, access control, and non-repudiation to the tripartite ANN based BAP.
Other BAP can also be used for the multipartite e-commerce transactions.
Figure 12.2a shows the operating stages of a basic ANN based BAP. Figures
12.2b- 12.2c show the FCN (Fully Connected network) model and ANN architecture
for 4-node distributed network. The number of entities involved in the e-commerce
ranges from 4 to more than 30.
The simplest network of an e-commerce model includes merchant, customer,
bank, and a credit card company. For a big e-commerce model, it can be observed
that the partitioning of the large network into a few groups for k-partite ANN based
BAP is more efficient. This is because the bottleneck of processing time is the
number of exchanged messages that needs to undergo the MePKC encryption,
decryption, signing, and verifying processes. It is well-known that the operating time
of PKC is so slow that it is 1000 times slower than the symmetric key crypto system.
12.2.3 Entity Partitioning in the Electronic Commerce Transactions
From Figures 12.3a- 12.3b and 12.4b, it is known that tripartite partitioning is
the optimal k-partite ANN based BAP. Figure 12.4a shows the way to partition a
network into three partitions. Furthermore, from Figure 12.5, it is shown that the e-
commerce entities can be basically divided into three groups: Essential group,
government group, and non-essential group. For the first group, the entities of
merchant and customer are critical and cannot be replaced; whereas other entities are
non-critical and can be replaced. For the second group, all the entities are critical and
cannot be replaced. For the third group, all the entities are non-critical and can be
replaced. The source node now is the customer to confirm or cancel a buy order.
200
Figure 12.2a Block diagram of ANN based BAP
Figure 12.2b FCN model of 4-node distributed network
Figure 12.2c ANN model of 4-node distributed network
Figure 12.2 ANN based BAP and its smallest model of 4-node distributed network
201
■mio
Traditional BAP
ANN based BAP
4000
4 6 8 10 12 14 16 18 20 22
Number of processors, n
Figure 12.3a Traditional BAP and basic ANN based BAP
10 4
10 3
10 2
10 1
ANN based BAP with no partition
ANN based BAP with 3 partitions
/X 기
4001
10 15 20 25
Number of processors, n
30
Figure 12.3b Basic ANN based BAP and tripartite ANN based BAP
Figure 12.3 Total number of exchanged messages for different types of BAP
9876543210
〕 0000000000
5
ぷ ま will P5^lmlp,5s .Jo Jwclulnu {so TL
202
4100
Group 2
Group 1
O Node
Q Source
Image of source node
U3 Trusted party
Group 3 W O
Figure 12.4a Partitioning of a 10-node distributed network into three groups
10 4
10 3
10 2
つ^ 一
Ms g 匪 for tn 으
Msg mj/J for m=8
^ ^ ― ― ―
Msg 舰 for m=6
어- "
Msg 匪 for m=4
Msg mUi for m=4
Ms S llia Jor m=2
Msg, . for m=2
2 4 6 8
ANN based BAP with ^ partitions, k
10
4101
Figure 12.4b Optimal selection of network partitioning for tripartite ANN based BAP
Figure 12.4 Partitioning of a distributed network and its optimal partitioning
selection
203
First Group: Essential Group
(1) Merchant
(2) Customer
(3) Merchant's bank
(4) Customer's bank
(5) Credit card company
(6) Credit card password company
(7) Loyalty point company
(8) Local insurance company
(9) Foreign product-origin insurance company
(10) Foreign intermediate-region insurance company
/X 기
4200
4201
Second Group: Government Group
(1) National federal government (various departments)
(2) National state government (various departments)
(3) National local government (various departments)
(4) Foreign product-origin federal government (various departments)
(5) Foreign product-origin state government (various departments)
(6) Foreign product-origin local government (various departments)
(7) Foreign intermediate-region federal government (various departments)
(8) Foreign intermediate-region state government (various departments)
(9) Foreign intermediate-region local government (various departments)
4202
Third Group: Non-Essential Group
(1) Local land transportation agent
(2) Local air transportation agent
(3) Local sea transportation agent
(4) International foreign product-ongin land transportation agent
(5) International foreign product-ongin air transportation agent
(6) International foreign product-ongin sea transportation agent
(7) International foreign intermediate-region land transportation agent
(8) International foreign intermediate-region air transportation agent
(9) International foreign intermediate-region sea transportation agent
(10) Local storehouse agent
(11) Foreign product-origin storehouse agent
(12) Foreign intermediate-region storehouse agent
Figure 12.5 Partitioning of the entities involved in the electronic commerce
transactions into three groups: Essential group, government group, and non-essential
group
204
4300
Tripartite ANN based BAP for the multipartite communications of online
electronic commerce transaction to achieve a consensus or Byzantine agreement:
(1) Loyal message means customer decides to confirm the buy order
(2) Faulty message means customer decides to cancel the buy order
4301
Enter the initialization stage of tripartite ANN based BAP
4302
Simultaneously enter the message exchange stage and application stage of
tripartite ANN based BAP using MePKC for communications:
First round:
Each group applies basic ANN based BAP to achieve a group BA, A G .
Second round:
Each trusted party decides group B A,
A G , from each node in her own group.
Faulty node detection (FND) round:
Each node sends individual group BA,
A I; to other nodes in the other groups.
Third round:
Each trusted party interchanges group B A to decide a network B A, A N
Fourth round:
Each trusted party sends A G and A N to the nodes in her own groups.
Fifth round:
Each node compares the network BA, A N , with individual group BA of each
node, A I; from the FND round to identify the faulty node(s) in the other groups.
4303
Enter the compromise stage of tripartite ANN based BAP to decide finally:
(1) Each node sends its Aj to customer the source node and customer derives A N
(2) If network BA is to confirm the buy order but faulty node exists in the non-
essential group, or essential group other than customer and merchant, go to 4300;
(3) Else if network BA is to confirm the buy order but faulty node exists in the
essential group for customer or merchant only, or government group, cancel the
buy order and exit;
(4) Else if network BA is to confirm the buy order and no faulty node, execute the
customer order to buy;
(5) Else if the customer decides to cancel the buy order, exit.
4304
Figure 12.6 Tripartite ANN based BAP with trusted party and faulty node detection
for multipartite electronic commerce transaction using MePKC cryptographic
schemes for communications
205
4400
Tripartite ANN based BAP for the multipartite communications of online
electronic commerce transaction to achieve a consensus or Byzantine agreement:
(1) Loyal message means customer decides to confirm the buy order
(2) Faulty message means customer decides to cancel the buy order
4401
Enter the initialization stage of tripartite ANN based BAP
4402
Simultaneously enter the message exchange stage and application stage of
tripartite ANN based BAP using MePKC for communications:
First round:
Each group applies basic ANN based BAP to achieve a group BA, A G , and
detect the faulty node(s) inside the group.
Second round:
Each node sends her individual group BA, A I; to all the other nodes in the other
groups.
Third round:
Each node uses majority function over the received Aj from all the nodes in the
other groups to decide the A G of other groups. Then, each node decides the
network BA, A N , from the three group BA.
Fourth round:
Each node compares A N with Aj from each node in the other groups to identify
the faulty node(s) in the other groups.
4403
V
Enter the compromise stage of tripartite ANN based BAP to decide finally:
(1) Each node sends its Aj to customer the source node and customer derives A N
(2) If network BA is to confirm the buy order but faulty node exists in the non-
essential group, or essential group other than customer and merchant, go to 4400;
(3) Else if network BA is to confirm the buy order but faulty node exists in the
essential group for customer or merchant only, or government group, cancel the
buy order and exit;
(4) Else if network BA is to confirm the buy order and no faulty node, execute the
customer order to buy;
(5) Else if the customer decides to cancel the buy order, exit.
Figure 12.7 Tripartite ANN based BAP without trusted party but still with faulty
node detection for multipartite electronic commerce transaction using MePKC
cryptographic schemes for communications
206
12.2.4 Tripartite ANN Based BAP with Trusted Party
Figure 12.6 shows a first implementation example of using BAP for the
multipartite e-commerce transaction having customer as the only source node.
Individual group BA, Ai, of each node equals to group BA, A G , for loyal nodes but
not faulty nodes. Yet in a second implementation, both customer and merchant can
be source nodes for two independent Byzantine communications of e-commerce,
where one is the customer confirming the money payment for the buy order, and
another one is the merchant confirming the product/service delivery for the buy order.
For a very brief introduction, please refer to Lee (2006a).
12.2.5 Tripartite ANN Based BAP without Trusted Party
And yet in another third implementation as in Figure 12.7, the trusted parties
can be excluded if the individual group BA of each node is broadcasted to the nodes
of other groups and used directly to derive the network BA.
12.3 Trust Boosting of MePKC Digital Certificate by Using More than One
Certification Authority and/or Introducer of Trust of Web
12.3.1 Related Works: Risks of Public Key Infrastructure
The applications of PKI (Public Key Infrastructure) (Kuhn, Hu, Polk &
Chang, 200 1 ) in healthcare, finance, government, communications, etc., are
presented by Kapil Raina (2003). Meanwhile, for the applications of PKI in the
Internet protocols, one can refer to a book "Cryptography and Public Key
Infrastructure on the Internet" by Klaus Schmeh (2001). For the details operations on
how a user applies for a digital certificate through a CA (Certification Authority),
one can refer to a book "PKI: Implementing and Managing E-Security" by Andrew
Nash, William Duane, Celia Joseph, and Derek Brink (2001). It can be observed in
the third book that in the current prior, the CA generates the asymmetric key pair for
the user. This is not good because it may have malicious CA attack.
Yet Carl Ellison and Bruce Schneier (2000) discussed 10 PKI risks in their
article "Ten Risks of PKI: What You're not Being Told about Public Key
207
Infrastructure". The first risk on "Who do we trust, and for what?" questions on how
well the CA maintains its private keys well. The current digital certificate having
only one digital signature to certify its authenticity is not having a strong enough
trust. The successful cracking of a CA private key or existence of malicious CA
remains as a PKI risk. Corell (2000) had some comments on these PKI risks that
smartcard should be in favour.
The third risk on "How secure is the verifying computer?" questions on the
possibility of attacker adding its own public key to the list of certificate verification.
Again, the current digital certificate having only one digital signature to certify its
authenticity is not having a strong enough trust. The sixth risk on "Is the user part of
the security design?" questions on the degree of user involvement in the PKI. So far,
the user role is not strong in keeping one's secret because the asymmetric key pair is
still generated by the CA. A user holds only a symmetric key protecting the private
key of the asymmetric key pair. Hence, there exists a need to innovate the PKI to
allow user to create asymmetric key pair oneself and boost up the trust level of PKI.
The identity-related crime conspired by an organized crime group is getting
serious in today electronically networked info -computer age. One may refer to
UNODC (United Nations Office on Drugs and Crime) website to know more about
this identity-related crime at [URL: http://www.unodc.org/unodc/en/organized-
crime/index. html] (Identity Theft Resource Center (ITRC), No date; "Identity-
Related Crime," 2007; Wikipedia Contributors, 2008bh).
Some human interaction models are needed to simulate the group efficiency
of the organized crime group to fake the digital certificate. From the simulation, one
can design PKI that can make the organized crime group (Lampe, No date; Glick,
1995; Livingston, 1996; "UNODC and Organized Crime," No date; Layman &
Potter, 1997; Maxim & Whitehead, 1998; Chen, 2004; Ruan & Wang, 2005; Siegel,
2005; Wang, 2007; "Identity-Related Crime," 2007; He, 2007; United Nations Office
on Drugs and Crime (UNODC), 2004, 2008; Wikipedia Contributors, 2008s, 2008af)
to be inefficient and hence the PKI trust level can be increased.
Another approach is to enact warning punishment (Weiss & South, 1998;
Wikipedia Contributors, 2007r). Bierly, Kolodinsky, and Charette (No date)
208
discussed the relationships of creativity and ethical ideologies. Chatterjee (No date)
analyzed the equity ownership and the directors' board attitude for responsibilities,
obligations, and crimes. Khatri and Tsang (2003) surveyed and analyzed the
antecedents and consequences of cronyism (Wikipedia Contributors, 200 8q) in
organizations, which helped to know the malice probability of one or more CAs.
Kaneyuki Kurokawa (1997) proposed some very interesting and good human
interaction models in his paper entitled "Modeling Human Interactions". The studied
models are committee meeting, labour division, exploratory group, and technology
transfer. This article has somehow showed the coefficient of inefficiency of
Parkinson's Law by Professor Cyril Northcote Parkinson (1958, 2002), in his book
"Parkinson's Law: Or the Pursuit of Progress". The coefficient of inefficiency
(Wikipedia Contributors, 2008i) ranges from 20 to 22 or more to trigger the
phenomena that a human group starts to become inefficient. Hence, there exists a
need to apply the results of these human interaction models over the organized crime
group to fake digital certificate in order to boost up the trust level of the digital
certificate.
There are other Kurokawa' s articles on human interaction models (Kurokawa,
1988, 1990, 1991). The Parkinson's Law has also been studied by some other
researchers (Aronson & Gerard, 1966; Aronson & Landy, 1967; Landy, McCue &
Aronson, 1969; "The Proof of Parkinson," 1969; Wikipedia Contributors, 2008x).
Klimek, Hanel, and Thurner (2008) analyzed the efficiency of a ministers' cabinet to
show the Parkinson's Law.
12.3.2 Some Human Interaction Models
In the twelfth application 9.1(xii) of the present invention in applying the
created big memorizable secret, method and system to boost up the trust level of
MePKC digital certificate by using more than one certification authority (CA) and/or
introducer of trust of web is designed. When one refers to the Figures 11.6-11.7 for
the MePKC digital certificate, one wih know that the private key and public key of a
user's asymmetric key pair is generated by the user and not the CA. This step can
avoid the malicious CA attack by giving the user to fully control one's private key
209
secret, and hence alleviating the sixth risk of Carl Ellison and Bruce Schneier (2000)
on "Is the user part of the security design?" questioning on the degree of user
involvement in the PKI.
For the first group of the user's asymmetric key pair of the three-tier MePKC
digital certificate as in Figure 11.7, it acts as the introducer of trust of web to the
other groups at tiers 2 and 3. For the certification of the first group instead, the
current prior art uses a single digital signature from a CA or introducer of trust of
web. However when the MePKC prevails, this prior art is not that appropriate in
view of the high demand of trust for the first group of three-tier MePKC digital
certificate. Innovated approach has to use to build up stronger trust by failing the
organized crime to fake MePKC digital certificate.
The possibility that the asymmetric key can be generated by a user allows the
user to bind one's identity, public key, and other data, into a binding file oneself. A
user can then request one or more CA and/or introducer of trust of web to sign,
certify, and issue digital signature. Every pair of binding file and a C A/introducer's
digital signature acts as a MePKC digital signature. Due to the independent trust of
each pair, other users only accept a binding file when all the pairs are verified.
Whenever there is one pair fails to be verified, then the user's binding file is rejected.
Hence, the more pair is the MePKC digital certificate, the lower is the probability to
successfully fake the user's MePKC digital certificate, the harder is the organized
crime group to be efficient, and the higher is the trust level of the user's first group of
MePKC digital certificate.
Coming to here, the Kaneyuki Kurokawa's human interaction models are
used to simulate the organized crime group to fake MePKC digital certificate.
Organized crime group has at least three persons to conspire a crime. Figure 12.8
illustrates the group efficiency of committee meeting. Figure 12.9 illustrates the
group efficiency of exploratory group. Figure 12.10 illustrates the success probability
of technology transfer. The models in Figures 12.8-12.10 are all developed by
Kurokawa and they are used in this article to derive Figures 12.11-12.13.
Kurokawa's model on committee meeting agrees with the coefficient of inefficiency
of Parkinson's Law ranging from 20 to 22 or more.
210
4500
Group Efficiency of Committee Meeting, GEc = n * p A (n-l)
n = Network size of human group
p = Probability of the chemistry being good between the chairperson and a member
n\p
0.500
0.700
0.850
0.900
0.000
0.000
0.000
0.000
1
1.000
1.000
1.000
1.000
2
1.000
1.400
1.700
1.800
3
0.750
1.470
2.168
2.430
4
0.500
1.372
2.457
2.916
5
0.313
1.201
2.610
3.281
6
0.188
1.008
2.662
3.543
0.109
0.824
2.640
3.720
8
0.063
0.659
2.565
3.826
9
0.035
0.519
2.452
3.874
10
0.020
0.404
2.316
3.874
4501
4.000
3.500
3.000
Group Efficiency of Committee Meeting
10 15
Network size of human group
令"
0.50
ᄀ뇨 p =
0.70
-©-p =
0.85
0.90
25
Figure 12.8 Group efficiency of a committee meeting according to the Kurokawa's
human interaction model
(l!un UBEnLO AoualoEm dnpIQ
211
4600
Group Efficiency of Exploratory Group, GEe = n * q A (n*(n-l)/2)
n = Network size of human group
q = Probability of the chemistry being good between a pair of members
n\ q
0.500
0.700
0.850
0.900
0.000
0.000
0.000
0.000
1
1.000
1.000
1.000
1.000
2
1.000
1.400
1.700
1.800
3
0.375
1.029
1.842
2.187
4
0.063
0.471
1.509
2.126
5
0.005
0.141
0.984
1.743
6
0.000
0.028
0.524
1.235
0.000
0.004
0.231
0.766
8
0.000
0.000
0.084
0.419
9
0.000
0.000
0.026
0.203
10
0.000
0.000
0.007
0.087
2.400
2.000
1.600
1.200
0.800
0.400
0.000
Group Efficiency of Exploratory Group
3 4 5 6
Network size of human group
4601
= 0.50
ᄀ뇨 q
= 0.70
夺 q
= 0.85
= 0.90
10
Figure 12.9 Uroup efficiency of an exploratory group according to the Kurokawa's
human interaction model
(llun ueEnLI) A0U3I0E 山 dnplo
212
4700
Success Probability of Technology Transfer, SP T = (p A (m-l+n)) * (q A n)
m = Number of ranks in the hierarchy, n = Number of receiving division, q = Probability of
the chemistry being good between a pair of peer members, p = Probability of the chemistry
being good between the chairperson and a member in a committee meeting
Curve
P
Q
R
S
n
1
l
3
3
P
0.750
0.850
0.750
0.850
m\ q
0.750
0.800
0.750
0.800
1
0.000
0.000
2
0.422
0.578
3
0.316
0.491
0.000
0.000
4
0.237
0.418
0.075
0.193
0.178
0.355
0.056
0.164
6
0.133
0.302
0.042
0.140
0.100
0.256
0.032
0.119
8
0.075
0.218
0.024
0.101
9
0.056
0.185
0.018
0.086
10
0.042
0.157
0.013
0.073
4700
Success Probability of Technology Transfer
Number of ranks in the hierarchy
Figure 12.10 Success probability of technology transfer according to the Kurokawa's
human interaction model
J3isue.ll AD0I0ULI031 Irussaoons Allllcleclpld
213
4800
Group Efficiency of Exploratory Group Formed from Leaders of Some Committee Meetings
(without condition for common consensus), GE EC0
tor m = 0, GE = 0; tor m = 1, GE = n*p A (n-l); tor m > 1, GE = ((n*p A (n-l))*m) + (m * q A (m * (m- 1 )/2))
m = Network size of human group of exploratory leaders, n = Network size of every committee
meeting, q = Probability of the chemistry being good between a pair of leader members, p =
Probability of the chemistry being good between the chairperson and a member in a committee
meeting
n
1
2
3
4
5
P
0.850
0.850
0.850
0.850
0.850
m\ q
0.800
0.800
0.800
0.800
0.800
0.000
0.000
0.000
0.000
0.000
1
1.000
1.700
2.168
2.457
2.610
2
3.600
5.000
5.935
6.513
6.820
3
4.536
6.636
8.039
8.906
9.366
4
5.049
7.849
9.719
10.875
11.489
5.537
9.037
11.374
12.819
13.587
6
6.211
10.411
13.216
14.950
15.871
7.065
11.965
15.237
17.260
18.335
8
8.015
13.615
17.355
19.667
20.896
9
9.003
15.303
19.510
22.111
23.493
10
10.000
17.000
21.675
24.565
26.101
4801
Group Efficiency of Exploratory Group Formed from Leaders of Some
Committee Meetings (without condition for common consensus)
28.000
24.000
23456789
Network size of human group of exploratory leaders
Figure 12.11 Group efficiency of an exploratory group formed from leaders of some
committee meetings (without condition for common consensus) as modified and
enhanced from the Kurokawa's human interaction models
(llun ueEnLO Aouap!£ dnplo
214
4900
Group Efficiency of Exploratory Group Formed from Leaders of Some Committee Meetings
(with condition for common consensus), GE ECW
for m = 0, GE = 0; for m = 1, GE = (n*p A (n-l)) * (p A n);
for m > 1, GE = (((n * p A (n-l)) * m) + (m * q A (m*(m-l)/2))) * ((p*q) A m) * (p A ((n-l)*m))
m = Network size of human group of exploratory leaders, n = Network size of every committee
meeting, q = Probability of the chemistry being good between a pair of leader members, p =
Probability of the chemistry being good between the chairperson & a member in a committee meeting
n
1
2
3
4
P
0.850
0.850
0.850
0.850
0.850
m \ q
0.800
0.800
0.800
0.800
0.800
0.000
0.000
0.000
0.000
0.000
1
0.850
1.228
1.331
1.282
1.158
2
1.665
1.670
1.433
1.136
0.859
3
1.426
1.281
0.953
0.649
0.419
4
1.079
0.876
0.566
0.331
0.182
0.805
0.583
0.326
0.163
0.077
6
0.614
0.388
0.186
0.079
0.032
0.475
0.258
0.105
0.038
0.013
8
0.366
0.170
0.059
0.018
0.005
9
0.280
0.110
0.033
0.009
0.002
10
0.211
0.071
0.018
0.004
0.001
4901
Group Efficiency of Exploratory Group Formed from Leaders of Some
Committee Meetings (with condition for common consensus)
— o— n
= 1
-z^-n
= 2
-e— n
= 3
= 4
2 3 4 5 6 7 8
Network size of human group of exploratory leaders
10
Figure 12.12 Group efficiency of an exploratory group formed from leaders of some
committee meetings (with condition for common consensus) as modified and
enhanced from the Kurokawa's human interaction models
(llun USEnLI) A0U3I0E 山 dnpls
215
5000
Success Probability of Exploratory Group Formed from Leaders of Some Committee
Meetings (with condition for common consensus), SP ECW
for m = 0, SP = 0; for m = 1, SP = p A n; for m > 1, SP = ((p*q) A m) * (p A ((n-l)*m))
m = Network size of human group of exploratory leaders, n = Network size of every committee
meeting, q = Probability of the chemistry being good between a pair of leader members, p =
Probability of the chemistry being good between the chairperson & a member in a committee meeting
n
1
2
3
4
5
P
0.850
0.850
0.850
0.850
0.850
m \ q
0.800
0.800
0.800
0.800
0.800
0.000
0.000
0.000
0.000
0.000
1
0.850
0.723
0.614
0.522
0.444
2
0.462
0.334
0.241
0.174
0.126
3
0.314
0.193
0.119
0.073
0.045
4
0.214
0.112
0.058
0.030
0.016
0.145
0.065
0.029
0.013
0.006
6
0.099
0.037
0.014
0.005
0.002
0.067
0.022
0.007
0.002
0.001
8
0.046
0.012
0.003
0.001
0.000
9
0.031
0.007
0.002
0.000
0.000
10
0.021
0.004
0.001
0.000
0.000
5001
0.900
0.100
Success Probability of Exploratory Group Formed from Leaders of
Some Committee Meetings (with condition for common consensus)
-e-n
= 1
-z^-n
= 2
-e— n
= 3
= 4
2 3 4
Network size of human group of exploratory leade
Figure 12.13 Success probability of an exploratory group formed from leaders of
some committee meetings (with condition for common consensus) ) as modified and
enhanced from the Kurokawa's human interaction models
>!IIICIBCIO.lcd sssons
216
In other words, if an organized crime group similar to committee meeting has
20 to 22 persons or more, then it starts to be inefficient. If the organized crime group
is similar to the exploratory group, then its inefficiency starts when the group has
five or more members.
Nevertheless, for the personnel in the CA, the situation is similar to the
committee meeting and getting 20 to 22 or more digital signatures from the CA
personnel is not that practical. For the introducer of trust of web, the situation is
similar to exploratory group. It is quite easy to get five of more digital signature to
certify a user's binding file. However, the trust level of introducer is limited to how
well the people know the introducer. It becomes quite impractical when other users
are asked if they know all the five or more introducers certifying a user's binding file.
Hence, other approach has to be implemented.
Up to here, the organized crime group, whether similar to committee meeting
and/or exploratory group, becomes inefficient when the number of group members is
more and hits a threshold. This is because criminals in an organized crime group are
normally lacking of a high level of trust among themselves. They normally try their
best to get rid of giving chances to other criminals to hold the evidence of their
criminal activities. The more members in an organized crime group, the harder it is
to be efficient. Furthermore, membership has to keep low to maintain a certain level
of profit sharing as reflected by the Sayan Chatterjee's article (No date) "Does
increased equity ownership lead to more strategically involved boards?".
A proof given to the Parkinson's Law is the time required to achieve a final
agreement on the works to be done tends to be more when more people are involved
and/or more time limit is given. This phenomenon is explained in articles Elliot
Aronson and Eugene Gerard (1966), "Beyond Parkinson's Law: The Effect of Excess
Time on Subsequent Performance"; Elliot Aronson and David Landy (1967),
"Further Steps Beyond Parkinson's Law: A Replication and Extension of the Excess
Time Effect"; as well as David Landy, Kathleen McCue, and Elliot Aronson (1969),
"Beyond Parkinson's Law: III. The Effect of Protractive and Contractive Distractions
on the Wasting of Time on Subsequent Tasks".
217
One more possible explanation is the longer time to achieve a common
agreement as in the BGP (Byzantine Generals Problem) together with the capability
to detect the faulty node. For organized crime group, all the members have to achieve
a common agreement and detect those possible faulty members before any action is
taken. As in the BGP for a very well-known fact, the larger is a network like the
human group, the more messages or time are needed to achieve the common
consensus. Therefore, to make the organized crime group to be inefficient, we have
to design a PKI similar to the Kurokawa's human interaction models.
Figure 12.11 illustrates the group efficiency of exploratory group formed
from leaders of some committee meetings without the condition for common
consensus among the members. This is an intermediate step to tell that when
common consensus among all the members is not needed, the group efficiency
increases as the members of exploratory groups and committee meetings increase.
Figure 12.12 illustrates the group efficiency of exploratory group formed
from leaders of some committee meetings with the condition for common consensus
among all the members. Here, all the personnel in the CA represent a committee
meeting, and each C A/introducer represents a member of the exploratory group.
Since other users only accept a MePKC digital certificate when all the
C A/introducer's digital signatures are verified, the organized crime group consisting
of the malicious CA and/or introducer has lower efficiency as the network size
increases. Figure 12.13 illustrates the success probability of exploratory group
formed from leaders of some committee meetings with the condition for common
consensus among all the members of the organized crime group.
12.3.3 Model to Boost up the Trust of MePKC Digital Certificate
It can be deduced that the more the criminals needed to succeed faking a
MePKC digital certificate, the lower is the success probability. One of the optimal
implementation is to have four (m = 4) or more groups of digital signatures for
binding file certification from the CA and/or introducers of trust of web, where each
CA contributes three (n = 3) or more digital signatures from its different personnel.
In this case, the success probability of the organized crime group is less than 6%.
218
5100
V
Method and system to boost up the trust level of MePKC digital certificate using
more than one certification authority (CA) and/or introducer of trust of web:
(1) First user creates an asymmetric key pair for MePKC digital certificate.
(2) First user binds the public key of the first user's asymmetric key pair, first
user identity, and other data, to create a binding file.
(3) First user sends the binding first to a first CA or introducer of trust of web for
certification to generate MePKC digital certificate.
(4) The first CA or introducer of trust of web authenticates the first user identity
using face-to-face checking of identity card or passport, or, if online transaction,
using the credit card number and bill.
(5) If first user identity is not authenticated, the first CA or introducer of trust of
web rejects the first user's certification application of MePKC digital certificate.
(6) Otherwise, if authenticated, the first CA or introducer of trust of web signs
and certifies the binding file as sent by the first user earlier by generating a first
digital signature later sent to the first user.
(7) The first's user MePKC digital certificate consists of the binding file and the
first digital signature from the first CA or introducer of trust of web.
(8) To increase the trust level of the first user's binding file, the user may send its
binding file again to a second CA or introducer for a second certification
application of a second MePKC digital certificate by repeating steps (3-6).
(9) The more the number of CA and/or introducer of trust of web certifying a first
user's binding file, the higher is the trust of the first user's binding file,
particularly, or MePKC digital certificate, generally.
(10) According to the Parkinson's Law, the coefficient of inefficiency is 20 to 22
persons for a human group meeting together to achieve a target.
(11) According to the derivation of Parkinson's Law, the trust level of this
method reaches a critically safe level when the number of members of an
organized crime is more than 20 to 22.
(12) When the Kurokawa's human interaction model is simulated for the
organized crime to create fake MePKC digital certificate, one of the optimal
implementation is to have four or more groups of digital signatures for binding
file certification from the CA and/or introducers of trust of web, where each CA
contributes three or more digital signatures from its different personnel.
5101
V
Other users like a second user verifying the first user's MePKC digital certificate:
(1) A second user receives the first user's MePKC digital certificate(s) consisting
of one binding file and digital signature(s) of the CA and/or introducer(s) of web
of trust.
(2) If all the digital signature(s) are verified, second user accepts the first user's
MePKC digital certificate.
Figure 12.14 Method and system to boost up the trust level of MePKC digital
certificate by using more than one certification authority (CA) and/or introducer of
trust of web
219
Figure 12.14 illustrates the operations of the method and system to boost up
the trust level of the MePKC digital certificate. Now, the first PKI risk informed by
Carl Ellison and Bruce Schneier (2000) on "Who do we trust, and for what?"
questioning on how well the CA maintains its private keys well and the third risk on
"How secure is the verifying computer?" questioning on the possibility of attacker
adding its own public key to the list of certificate verification, can also be improved
by having more than one C A/introducer certifying a digital certificate. This is
possible because users can generate their own asymmetric key pairs. The CA or
introducer of trust of web may be a government authority, and people working in the
fields of religion, law, police, security, politics, army, finance, diplomacy, etc., who
have a high trust level in the society like judge, Commissioner for Oaths, lawyer, etc.
220
CHAPTER 13 MePKC TIMESTAMPING SCHEME FOR
EVIDENCE OF INTELLECTUAL PROPERTY
(IP) ORIGINALITY
13.1 Proof of Copyright Ownership Using Digital Timestamp in Malaysia
Copyright is an intellectual property needing no registration generally for an
original work of authorship like literary, artistic, musical, or computer program
affixed in any tangible medium of expression. It lasts for an author's life plus 50
years in Malaysia. Without registration, the author has to prove its time of creation
using other methods. In Malaysia, proof of copyright and priority is generally
established by way of a statutory declaration (SD). The cost is low and the
processing fast. However, its disadvantages are low confidentiality and possible
collusion between the author and Commissioner for Oaths. Here, digital
timestamping under Malaysia's Digital Signature Act and Regulations (Act 562) is
proposed to prove copyright ownership in electronic works (Lee, Radhakrishna &
Khaw, 2007). Digital timestamping providing lower cost, faster processing, higher
confidentiality, better security, and management, is a variant of digital signature.
13.1.1 Introduction
Intellectual properties (IPs) have become increasingly important in developed
countries. Taplin (2004) reported that IP assets accounted for up to 70% and 40% of
market values of all corporate assets in United States and Japan, respectively.
Chandran (2007) stated that for any company, and especially for pharmaceutical
companies, IP is more valuable than any of its tangible physical assets, where IP
constituted more than 80% of the total revenues of any company while tangible
assets accounted for only 20%. Again, Ocean Tomo LLC (Ocean Tomo, No date;
Wikipedia Contributors, 2008d) figured out that the components of S&P 500 market
value in 2005 also had 79.7% to be intangible assets.
Among the IP, patent has the largest economic value. In fact, IP is a group of
rights consisting of copyright, patents, registered designs, trademarks, and know-how
221
(Curzon, 1998; Multimedia Development Corporation Sdn Bhd (MDC), 2002a,
2002c, 2002d, 2002e).
Certain IPs require official registration while others don't. Copyright requires
no registration in Malaysia. This interdisciplinary paper looks at various methods for
proof of copyright, and seeks to promote the idea of digital timestamping as a viable
solution to evidentiary requirements. Both the legal and technical aspects of digital
timestamping are discussed.
In the US, in order to claim statutory damages, a copyright has to be
registered at the US Copyright Office. The statutory damages are pre-established
damages for cases where a correct sum is deemed difficult to be calculated
(Wikipedia Contributors, 2006). The basic level of statutory damages in US ranges
from USD$750 to USD$30,000 per work at the discretion of court (World
Intellectual Property Organization (WIPO), No date; Wikipedia Contributors, 2007e).
In Malaysia, a statutory declaration (SD) or affidavit is commonly used to
prove the copyright authorship under the Copyright Act 1987 (Act 332) (MDC,
2002a). Copyright offender in Malaysia is subject to a fine not exceeding
MYR$25,000 or to imprisonment not exceeding 3 years or to both under Copyright
Act 1987 Section 43.
Digital timestamping is a cryptographic scheme being a variant of digital
signature. In Malaysia, it is enforced under the Digital Signature Act 1997 and
Regulations 1998 (Act 562) (MDC, 2002b). Currently, Malaysia has only 1
registered service provider of digital timestamping, i.e. MSC Trustgate.com Sdn.
Bhd. (47823 1-X), a subsidiary of Multimedia Development Corporation Sdn. Bhd
(MDeC, which is previously known as MDC) (Malaysian Communications and
Multimedia Commission (MCMC), No date).
Haber and Stornetta (1990, 1991) firstly proposed a digital timestamping
scheme with its described applications for scientific priority of patent inventions [9-
10]. Here, we wish to extend its application to proof of copyright authorship and/or
ownership in the Malaysian perspective. Cost estimation and comparisons with other
methods are presented.
222
13.1.2 Related Works: Copyright
In Malaysia copyright is governed by the Copyright Act 1987, which extends
protection for a qualified person to all types of literary, musical, artistic works, film,
sound recording, broadcasts, derivative work, published edition, and live
performances (Khaw, 2001).
Copyright subsists in original literary (including computer programs),
musical, or artistic works, sound recordings, films, broadcasts or cable programmes,
architectural plans, and the typographical arrangements of published editions of
works (Curzon, 1998).
In Malaysia, the copyright owner is given the right to reproduce, prepare
derivative works, distribute, communicate their works, perform, or rent their works
for the duration of the author's lifetime plus 50 years after his death. In European
Union, the protection period is 70 years after the death of the last author; whereas
corporate authorship is 70 years from the year the work is created. In the US, the
Sonny Bono Copyright Term Extension Act of 1998 extends the protection period of
individual works to 70 years after the death of the last author; whereas corporate
authorship is 120 years from the date of creation or 95 years after publication,
whichever is shortest. Hence, the security design of timestamping scheme has to last
for about 100 years in Malaysia.
It is transmissible by assignment or will as personal property. Copyright
exists automatically once it is expressed in any tangible material form, e.g. if one
doodles on a piece of paper while chatting on the phone, then that doodle is
automatically protected without the need for any registration. However, if one were
to compose a tune in one's head and hum it in the shower that is not protected as it
has not been reduced to material form. Were it to be recorded then it would be
protected.
The first owner of a copyright work is the author. Then, copyright may be
assigned or transmitted. In cases where a work was created under a contract of
employment or pursuant to a commission, the copyright in the work is transferred to
the employer or commissioner, as the case may be. It must be noted that copyright is
vested in the copyright owner and not the author, unless he is also the owner.
223
There is no registration system for copyright in Malaysia (Intellectual
Property Corporation of Malaysia (Perbadanan Harta Intelek Malaysia) (MylPO), No
date). In the event of any copyright dispute, authorship and/or ownership would have
to be proved by the party initiating the action. Internationally, the Berne Convention
for the Protection of Literary and Artistic Works (WIPO, 1979; Wikipedia
Contributors, 2007i) in 1887 set out the scope of copyright protection, applicable to
all member countries. It was formed in order to formulate greater uniformity in
copyright law among countries and to give copyright owners certain minimum levels
of copyright protection without the requirements of registration in member countries
(Articles 1 and 2 (WIPO, 1979)). The Berne Convention requires a signatory country
to recognize a copyrighted work of authors from other signatory countries in the
same way as it recognizes the copyright of its own national or domiciliary.
13.1.3 Related Works: Methods of Proving Copyright Ownership
Currently, there are six methods to prove the copyright ownership as follows:
(i) Self-addressed envelope with original work mailed back to oneself;
(ii) Log book;
(iii) Lodging a copy with solicitor or bank;
(iv) Hashing;
(v) Registration and/or preregistration at copyright office; and
(vi) Statutory declaration (SD).
For self-addressed envelope with original work mailed back to oneself, this is
perhaps the oldest method being used to prove the scientific priority and copyright
authorship or ownership. The original work is inserted into a self-addressed envelope,
which is then sealed and mailed back to the author. The postal time stamp acts as a
proof for the creation time. Whenever there is a case of copyright infringement, the
sealed envelope is opened in public to settle the dispute. However this is known as
the "poor man's copyright" as there is scope for abuse. There is nothing to prevent
224
tampering or pre-po sting envelopes to oneself and inserting allegedly original works
into the envelope later. As such they will not stand up as credible evidence in court
(UK Copyright Service (UKCS), No date a).
For log book, an author may keep a habit like an inventor and scientist, where
a log book is properly recorded and endorsed by one or more third parties regularly.
In case of dispute, the log book and the endorsers can provide the proof of authorship.
For lodging a copy with solicitor or bank, the party, who endorses a log book,
can be specifically a solicitor as in log book. Sometimes, a copy of the copyrighted
works can be lodged with a solicitor and/or bank, who act as copyright witnesses.
However, copyright witnessing is not their main concern and they are unlikely to
understand the essential implications of the service (UKCS, No date a). Other
weaknesses are data loss due to corruption and disaster as well as loss of evidence for
future cases.
For hashing, hashes are cryptographic operations performed to transform one
or more fields into a unique fixed bit stream as the contents of a piece of digital
evidence (Oppliger & Rytz, 2003; Maurer, 2004) can be preserved. These
mechanisms ensure that digital information "has not been altered." Cryptographic
hashes can be used to protect evidence from tampering for long periods of time.
Using algorithms such as SHA-2 and RIPEMD-256, content integrity can be attested
to for many years even under distributed brute force attack. Thus, by applying
cryptographic hashes and digital signature technology to the problem of evidence
preservation, the "who" and "what" of digital data can be identified and maintained.
However this still leaves time to be established to claim scientific priority and
copyright evidence (Duren & Hosmer, 2002).
For registration and/or preregistration at copyright office, in UK and US,
there are copyright offices managing the copyright registration as strong evidence
upon a fee payment. In UK, copyright registration service is offered by The UK
Copyright Service (UKCS) (UKCS, No date b). For online registration, UKCS
charges GBP$35 for 5 years or GBP$60 for 10 years per work, where it covers an
upload up to 10MB per registered work and upload over 10MB are subject to an
additional fee of 2 pence (= GBP$0.02) per additional 1MB or part thereof up to
225
virtually unlimited size. For postal registration, UKCS charges GBP$40 for 5 years
or GBP$70 for 10 years per work, plus different additional fees according to the
formats of hard copies, up to a maximum size of 8.5 GB. Meanwhile, the US
Copyright Office (USCO) offers registration and preregistration services.
Preregistration is for unpublished work, where creation of work has begun aiming for
commercial distribution, e.g. motion picture, musical work, sound recording,
computer program, book, or advertising photograph. Preregistration is not a
registration and its fee is USD$100. After a work is published, registration at USCO
is required and the electronic filing of a basic copyright registration is USD$35 and
paper application is USD$45 (USCO, No date).
For statutory declaration (SD), this is the most commonly used method of
establishing copyright in Malaysia. By Malaysia Copyright Act 1987 Section 42, an
affidavit or statutory declaration made before a Commissioner for Oaths (Curzon,
1998) or Notary Public and asserting that copyright subsists in a particular work and
the person named therein is the copyright owner may be admitted as prima facie
proof of the facts stated therein. This is a convenient and economical way of proving
copyright and ownership. Section 42 places the burden on the infringer to dispute
and challenge the prima facie evidence adduced by the copyright owner
(International Intellectual Property Alliance (IIP A), 200 1 ). Section 42 was
introduced to facilitate proof of copyright and ownership in cases involving foreign
copyright owners.
There are some problems for SD like unreliability of information in the SD
itself, need to verify information in the SD itself, challenges to information in the SD,
and SD proof for patent invention is hard to establish. In the US, the legal case of
laser inventor Gordon Gould (Taylor, 2002; Wikipedia Contributors, 2007n) uses SD
and it has lasted for about 30 years. Hence, it is inefficient for IP evidence, especially
for patent.
However in practice, there have problems with the admission of Section 42
affidavits. Courts are cautious with respect to presumptions, and have required
prosecutors to prove subsistence issues through other documents such as record
company receipts of first publication, letters of authority, or sometimes even live
226
testimony of right holder representatives (CLJ Legal Network Sdn. Bhd., 1998) (CLJ
- Crime, Law, and Justice). Failure to comply with these requirements has in some
cases led to acquittals or the rejection of the affidavits as evidence of ownership. The
root of the problem has been that not many judges are well versed in Copyright law
and defence counsels are quick to challenge any actions on technical grounds.
Further weaknesses are its low confidentiality and possible collusion between the
author/owner and Commissioner for Oaths.
13.1.4 Digital Timestamping Scheme to Prove Copyright Ownership
Ismail (200 1 ) discussed some timestamping schemes for Malaysian
applications. Among them, linking scheme (Haber & Stornetta, 1990, 1991) and tree
scheme (Benaloh & de Mare, 1991) limit the power of timestamping authority (TSA).
Here, a modified scheme is proposed to limit the TSA power but has simpler
implementation as in Figures 13. 1-13. J. The TSA cannot collude with a user to
backdate a time stamp more than one day using publication of dany superhash at a
repository authority like newspaper.
13.1.5 Malaysia Digital Signature Act 1997 and Regulations 1998 (Act 562)
A "digital signature" is a transformation of a message using an asymmetric
crypto system such that a person having the initial message and the signer's public
key can accurately determine (Section 2 (MDC, 2002b)):
(i) whether the transformation was created using the private key that
corresponds to the signer's public key; and
(ii) whether the message has been altered since the transformation was
made.
Thus it is able to identify the signer and also pick up evidence of any
tampering. Section 64 deems a digitally signed document to be a written document as
if it had been written on paper if:
227
(i) it bears in its entirety a digital signature; and
(ii) that digital signature is verified by the public key listed in a certificate
which:
(1) was issued by a licensed certification authority; and
(2) was valid at the time the digital signature was created.
0.0 Initialization vector, IV = a random bitstream for the first day or yesterday
superhash for second day and beyond. Let i = 1, 2, 3, ..., N, where N is the
number of total time stamp users for one day, and j = 1, 2, 3, ..., oo.
1.0 For j-th day with N users.
1.1 User Ui creates hash Hn of a digital document D.
1.2 User sends Hn to timestamping authority (TSA).
1.3 TSA creates hash from the concatenation Cn of Hn and a time stamp Ti
having the present time synchronized to an Internet time server like
"time.windows.com" or "time.nist.gov".
1.4 TSA signs the H 2 i using its private key K pte and creates hash H 3i as signed
timestamp.
1.5 TSA stores the concatenation of H 3i and IV
1.6 TSA sends Cii to Ui and repository authority R.
1.7 User Ui verifies the signed timestamp H 3i using Ti and TSA's public key K pub
as in Fig. 2.
1.8 If H3i is verified, user Ui accepts the H^; otherwise, Ui rejects the H3i and goes
to step 1.2.
2.0 TSA creates a daily pre- superhash PHj from the concatenation of ordered
on j-th day.
PHj = hash(C 2 i II C 22 II C 23 ᅵᅵ… ᅵᅵ C 2i I ᅵ… II C 2N )
3.0 TSA creates daily superhash SHj from the concatenation of IV and PHj on j-th
day.
3.1 If j = 1, IV = a random bitstream; otherwise if j > 2, IV = SHj— 1 .
3.2 SHj = hash(IVIIPHj)
3.3 TSA stores the superhash SHj.
4.0 TSA sends the SHj to repository authority R for deposit and publication to
limit the TSA power.
5.0 Go to step 1.0 for a following day.
Figure 13.1 Generation of timestamp and superhash
228
0.0 Digital or electronic document D, concatenation of signed time stamp
and time stamp IV
1.0 User creates hash H v n of a digital document.
2.0 User creates hash H V 2i from the concatenation C v h of H v n and IV
3.0 User applies TSA's public key K pub on signed timestamp H 3i to create
decrypted signature H V 3i.
4.0 If H V 2i = H V 3i, the signed timestamp H 3i is verified and the user accepts it;
otherwise if H V 2i ^ H V 3i, signed timestamp is rejected.
Figure 13.2 Verification of a signed timestamp
0.0 First day IVi or yesterday superhash SHj_i, daily superhash SHj,
concatenations C2i of signed time stamps H 3i and time stamps Ti on j-th day
from repository R. To-be-verified concatenation C V 2i supplied by a user Ui.
1.0 User Uk checks the presence of C V 2i among the Cii in the R's record.
2.0 If C V 2i equals to one of the C^, then go to step 3.0; otherwise, user Uk rejects
the C V 2i and ends.
3.0 User Uk creates a daily pre- superhash PHj from the concatenation of ordered
C2i on j-th day.
PHj = hash(C 2 i II C 22 II C 23 II ... II C v2i II ... II C 2N )
4.0 User Uk creates a to-be-verified daily superhash SH V j from the concatenation
of IV and PHj.
4.1 If j = 1, IV = IVi; otherwise if j > 2, IV = SHj 小
4.2 SH V j = hash(IV II PHj)
5.0 If SH V j = SHj, then user Uk verifies the C V 2i; otherwise, user Uk rejects the C V 2i.
Figure 13.3 Verification of daily superhash to limit TSA power
Further under Section bo, a certificate issued by a licensed certification shall
be an acknowledgement of a digital signature verified by reference to the public key
listed in the certificate, regardless of whether words of an express acknowledgement
appear with the digital signature and regardless of whether the signer physically
appeared before the licensed certification authority when the digital signature was
created, if that digital signature is:
(i) verifiable by that certificate; and
229
(ii) affixed when that certificate was valid.
Section 67 presumes the validity and truth of the contents of the certificate
issued by a recognized Certification Authority or Repository as to the digital
signature being that of the subscriber. Apart from digital signatures, Section 70 also
recognizes digital timestamps. A "time-stamp" means (Section 2 (MDC, 2002b)):
(i) to append or attach to a message, digital signature or certificate a
digitally signed notation indicating at least the date, time and identity
of the person appending or attaching the notation.
Further Section 62 of the DSA Regulations provides that a recognised
date/time stamp service shall:
(i) on receipt of a document for time- stamping, immediately time- stamp
the date and time of its receipt on the document and digitally sign the
time- stamp; and
(ii) at the end of each business day cause to be published only the hash
result of the document in at least one recognised repository all
documents time- stamped by it in that day.
Thus a digital timestamp is able to provide evidence of "who", "what", and
"when" accurately to establish priority of copyright. It helps the author to prove
when the idea was expressed - this is the moment when copyright protection begins
and is especially effective for protecting prepublication work. The third-party
timestamp and certificate provides evidence to help resolve or avoid legal disputes
without the need for costly and time-consuming litigation.
13.1.6 Malaysia Evidence Act 1950 (Act 56)
Amendments to the Evidence Act 1950 (Act 56) allowed the admissibility of
"computer-generated documents" (International Law Book Services (ILBS), 2003).
230
Under Section 3, a matter recorded, stored, processed, retrieved, or produced by a
computer is a "document". Section 62 explains that a document produced by a
computer is primary evidence. Section 78A accepts public documents produced by
computers. Section 90A admits in evidence documents produced by computers
subject to certain conditions. Timestamp produced by computers is a document that
can act as primary and prima facie evidence.
13.1.7 Security Analysis
The security of the proposed digital timestamping scheme depends on the
lowest security strength among the hash algorithms and digital signature scheme on
timestamp. Hash algorithms like SHA-256, SHA-384, and SHA-512, have no key
and the proposed bits of security range from 128 to 2^0 bits with protection periods
at 30 years to foreseeable future, respectively, based on the symmetric key scale.
For digital signature scheme of timestamp, it needs a key pair to sign and
verify a digital signature. Due to human memory limits, memorizable private key is
currently not practical until the invented big secret creation methods are proposed in
this research project. Hence, encrypted private key or two-factor authentication using
a symmetric key and a token is normally used. In other words, the weakest point of
digital timestamping scheme is at the digital signature protocol, which depends on
the safety of symmetric key encrypting a private key and the availability of token.
The security of the proposed timestamping scheme in Figures 13.1-13.3 is
similar to the linking (Haber & Stornetta, 1990, 1991) and tree schemes (Benaloh &
de Mare, 1991) because only the superhash generation is different. The daily
superhash in the proposed scheme here is generated from the concatenation of
yesterday superhash and the concatenation of all the timestamps at the present day.
These schemes rely on the security of hash function and digital signature for
the individual timestamp. For the security against the malicious TSA, it relies on the
aaily superhash safely kept at an independent repository authority. As long as there is
no collusion between the TSA and repository, malicious TSA can be detected. If
there exists collusion between TSA and repository, public can detect this event by
keeping a published daily superhash for future verification. Another alternative is to
231
increase the number of repository. Table 13.1 compares the proposed scheme with
the linking and tree schemes.
Table 13.1 Comparisons of our scheme with linking and tree timestamping schemes
Feature
Linking
Scheme
Tree Scheme
Proposed
Scheme
Signature Scheme
Same. Equal security strength.
Single Timestamp
Same. Equal security strength.
Number of Computer Units
One
Many
One
Generation Speed of Superhash
Slow
Fast
Moderate
Malicious TSA
Same. Equal security strength.
13.1.8 Computation Load
The computation load is heavy during the signing process and light during the
hashing process. There is only one signing process for one timestamp. Meanwhile,
there are many hashing processes for timestamp and superhash. Hence, the
computation load is efficient and similar to the linking scheme and tree scheme
(Ismail, 2001). The signing process is also fast enough because it is signing a hash
value rather than a whole digital file.
13.1.9 Implementation Costs
The implementation cost of this digital timestamping scheme is estimated
based on the one-time and annual operating costs as in Table 13.2.
The USCO receives 600,000 copyrighted works annually from a 300 million
population. Malaysia with a population of 27 million is estimated to have 54,000
copyrighted works annually by assuming the US and Malaysia have same level of
creativity. Let one timestamp to be charged at MYR$5 for 5-year repository period,
then a total of MYR$270,000 can be obtained from the sale of timestamps. One can
breakeven within the first year. To absorb the hidden cost and inflation as well as to
maintain a fixed price per timestamp for about 5 to 10 years, a fee of MYR$10 per
timestamp shall be charged for a repository period of 30 years.
232
Table 13.2 Cost estimation table of a digital timestamping scheme in Malaysia on 8
June 07
Item
T T ' j.
Unit
Cost (RM)
Repository Licence
- establishment stage
2,500
- operation stage
1
2,500
- granting tee
つ f\ r\f\r\
30,000
allllUd.1 U Uv-/A a Llllg ICC
7 SOD
ᄂ /IglLdl L1111C o LalllU 니ᄂ Cll ᄂ C
- establishment stage
2,500
- operation stage
1
2,500
- granting fee
30,000
- annual operating fee
2,500
Computer
4
10,000
Windows Vista Business Edition
4
5,080
Norton Antivirus 2007 (1 year)
4
558
ZoneAlarm Internet Security Suite (3 PCs) (1 year)
2
349
Spybot - Search 7 Destroy 1.4
4
2,000
InstallShield 12 Express (Windows) + Visual Studio .NET
Professional 2005
9
1 ,001
Corporate Web Hosting (1 year)
1
1,000
Furniture
1
6,000
Annual Company Secretary Fee
1
3,000
Annual Accounting Fee
5,000
Annual Auditing Fee
5,000
Annual Office Rental
24,000
Annual Advertisement Fee
12,000
Annual Transportation Fee
3,000
Annual Legal Fee
6,000
Annual Engineer Salary
2
72,000
Annual CreditCard Commission (VISA & MasterCard @
2.35%)
54k
1,269
Total (one-time cost + annual fee, where n is year)
100,741 +
138,176n
N.B. USD$1.00 = MYR$3.4850 (RM) (The Star Online, 2007)
233
A regular renewal can be made. Otherwise, longer protection periods need
higher fees such as MYR$20 per timestamp for 100 years subject to the TSA
sustainability.
13.1.10 Comparisons
Table 13.3 compares the proposed method with other methods to prove
copyright authorship/ownership. In Malaysia, an SD is charged at MYR$4 for the
first copy and its following copies. The duplication-free and travelling-free factors
make timestamp cheaper. Other advantages of copyright evidence using digital
timestamp are independent evidence, contractual contingency, confidentiality, fast
processing, limited authority power, low cost, and better management.
Table 13.3 Comparisons of methods to prove copyright authorship/ownership
Features
Self-Addressed
Posting
Log Book
Lodging a Copy
with Bank, etc.
Hashing
Registration
Statutory
Declaration
Digital
Timestamping
Independent Evidence
N
N
Y
Y
Y
Y
Y
Contractual
Contingency
N
N
N
N
Y
N
Y
Confidentiality
N
N
N
Y
Y
N
Y
Duplication-Free Cost
N
N
N
Y
N
N
Y
Travelling-Free Cost
N
N
N
Y
Y
N
Y
Fast Processing
N
N
N
Y
N
Y
Y
Limited Authority
Power
N
N
N
N
Y
N
Y
Low Cost
Y
Y
N
Y
N
Y
Y
Better Management
N
N
N
Y
Y
N
Y
Low Complexity
Y
Y
Y
N
N
Y
N
N.B.: N = No, Y = Yes.
234
13.1.11 Conclusion
From both the legal and technical perspectives, digital timestamping offers
comparatively better proof, security, efficiency, and economy than the other methods
discussed, especially SD. This section mainly proposes a new alternative to prove
copyright ownership from the legal aspect using a cryptographic timestamping
scheme. The proposed timestamping scheme is slightly modified from the previous
schemes.
13.2 IP Evidence Using Digital Timestamp
13.2.1 Introduction
Among the IPs, patent and copyright are the sources of income. Gregory
Aharonian (No date) listed out the incomes due to patent and copyright in the
website of STO (Source Translation and Optimization). Gordon Gould (Wikipedia
Contributors, 2007n), who is the inventor of laser, has a thirty- year patent war of
lawsuit to claim his invention for patent (Taylor, 2002). The evidence to prove the
creation time is critical for his patent filing because the US follows the first-to-invent
system. Sarcastically, Gould is not awarded the Nobel Prize in Physics for his
invention of laser but there are many other Nobel laureates based on laser.
In a book excerpt by Nick Taylor (2002):
"In 1957 Gordon Gould, then an obscure physicist and perennial graduate
student, conceived one of the revolutionary inventions of the twentieth century ― the
laser. But before he could submit a patent application, a prominent professor of
physics whose office was next door to uould's filed his own laser patent claims.
Gould fought to reclaim the rights to his work, beginning a battle that would last
nearly thirty years."
Here, the notary system has weakness. Otherwise, the lawsuit would not have
been prolonged to 30 years. The disadvantages are low confidentiality and possible
collusion between the inventor/author and Commissioner for Oaths. In the digital era,
it is also hard to prove the creation time of a copyrighted work. Neea is required to
235
differentiate between originality and plagiarism. Consequently, digital timestamp
service is proposed here to provide IP evidence in Malaysia and other geo-political
regions, particularly patent and copyright.
The suitability of timestamp evidence for patent filing system is investigated.
There are two patent filing systems: First-to-invent and first-to-file. These patent
filing systems have the mixed advantages and disadvantages like first inventor in the
interference case, possible idea accumulation towards commercial value, reasonable
time for prototype development, notary service, patent translation costs, patent filing
costs, and intentional delay of patent filing.
Based on the good and bad points, a hybrid system may be introduced, which
is called "limited first-to-invent patent filing system", where the period between the
first date of invention claim and first filing date is within a reasonable figure like one
to two years. The legislation of the related laws in the fields of cyberlaw and
intellectual property (IP) law is needed to enforce the IP evidence using digital
timestamp as proposed here.
13.2.2 Related Works: Patent Filing Systems
In this world, there are two patent filing systems: First to invent, and first to
file. By the last decade, there are only three countries in the world implementing the
first-to-invent patent filing system (Inventors Assistance League, No date; Coster,
2002; Wikipedia Contributors, 2007j); whereas the other countries are all
implementers of first-to-file patent filing system. Till today, the USA is the only
country implementing the first-to-invent patent filing system.
Nevertheless, now even the USA is on the brink of patent laws reformation
since the last decade (Samuelson, 2004; Mossinghoff, 2005; Wikipedia Contributors,
2008b, 2008e) for the issues like patent filing system, number of core and edge
invention claims in a patent, unity of invention (Wikipedia Contributors, 2008ba),
and inventorship (Wikipedia Contributors, 2008ao).
First to invent means the first inventor has the right to file for patent first
upon proving the first date of invention claim whenever there is an inventor
236
interference case. First to file means the inventor, who firstly files for the patent
application throughout the world, has the right to claim as the inventor and the filing
date is the invention priority date.
13.2.3 Related Works: Digital Timestamping Scheme
The digital timestamping scheme proposed in Section 13.1 to prove copyright
authorship/ownership can be extended to other IPs like patent here. Please refer to
Sections 13.1.9 and 13.1.10 for the implementation costs, as well as comparisons for
advantages and disadvantages, respectively.
For clarity, the added advantages includes confidentiality, infinite
complimentary duplication of timestamp, savings on transportation and operating
costs, lower overall cost, faster processing, better management, and limited authority
power of timestamping service provider. The timestamping authority (TSA) has
limited power that it cannot backdate because of the daily superhash stored regularly
in a trusted repository everyday. In case the TSA is malicious, the accuracy of the
timestamp can be trusted at the unit of day. To increase the fault tolerance to
malicious repository, the number of repositories can be increased and resorts to the
Byzantine Agreement Protocol (BAP) of the Byzantine Generals Problem (BGP).
13.2.4 Proposing Limited First-to-invent Patent Filing System
IP evidence with digital timestamp is a timely proposal in view of the
inadequacies of existing methods to prove IP creation time. Additionally, the advent
of computing technology has paved the way for more reliable and efficient means to
digitally protect information (IP inclusive).
At the same time, the proposed service will prevent patent lawsuits similar to
Gould's from recurring, which is based on first-to-invent system in the USA rather
than first-to-file system in the rest of the world.
Considering the advantages and disadvantages of these systems (Inventors
Assistance League, No date; Coster, 2002; Mossinghoff, 2005), like first inventor in
the interference case, possible idea accumulation towards commercial value,
237
reasonable time for prototype development, notary service, patent translation costs,
patent filing costs, and intentional delay of patent filing, a hybrid system shall be
introduced, which is a limited first-to-invent patent filing system, where the period
between the first date of invention claim and first filing date is within a reasonable
figure like one to two years.
In a book excerpt by Burgess and Power (2008):
"The U.S. Chamber of Commerce estimates that counterfeit and pirated
products account for 5 percent to 7 percent of the global economy, and results in the
loss of more than 750,000 jobs and approximately $250 billion in sales to the United
States alone
The threats of economic espionage and intellectual property (IP) theft are
global, stealthy, insidious, and increasingly common. According to the U.S.
Commerce Department, IP theft is estimated to top $250 billion annually and also
costs the United States approximately 750,000 jobs. The International Chamber of
Commerce puts the global fiscal loss at more than $600 billion a year."
Limited first-to-invent patent filing system has all the features of first-to-
invent patent filing system except that the first date of invention claim and first filing
date is limited to be within a reasonable figure like one to two years, depending on
the further research studies for better optimization. The main aim of this limited first-
to-invent system is for data protection (Ha skin, 2008) to resist the prevalent hacking
activities (McClure, Scambray & Kurtz, 2001; Beaver, 2004; Pankaj, 2005; Berinato,
2007a, 2007b, 2007c, 2007d, 2007e, 2007f; Wikipedia Contributors, 2007q, 2008n;
McMillan, 2008b) and economic espionage (Fialka, 1999; Fink, 2002, 2003;
McNamara, 2003; Nasheri, 2004; Burgess & Power, 2008). Hacking and economic
espionage are the main killing weaknesses of the first-to-file patent filing system.
Beaver (2004) reported that a networked computer without proper firewall
(Ogletree, 2000) settings would be hacked within 30 minutes. Yet in the latest news,
Markoff (2008) informed that the hacking period dropped to less than 5 minutes after
a hacker had operated for 30 seconds to access a prey computer. This reflects how
serious and dangerous the current computer communications network security
( Stalling s, 2000) is in this networked info-computer era.
238
Identity theft can happen when a hacker copies a prey's computer data as disk
image (Wikipedia Contributors, 200 8bf) using disk cloning software (Wikipedia
Contributors, 200 8be), and then put the disk image into a second computer and
modify, add, delete, etc. on some contents, which creates a second type of zombie
computer (Wikipedia Contributors, 200 8bj) and/or botnet (Wikipedia Contributors,
2008bd, 2008bi). This second type of zombie computer, when connected to the
Internet, can fool other prey hackers watching this zombie computer version 2. Of
course, if there are any confidential information, business secret, and other intangible
assets, in the prey computers, then they shall be considered as disclosed and released
to the public domain.
Tables 13.4-13.6 show the advantages and disadvantages of first-to-file, first-
to-invent, and limited first-to-invent patent filing systems, respectively. From these
tables, it can be concluded that limited first-to-invent patent filing system shall be
highly appreciated and MePKC digital time stamp shall be used as the IP evidence.
Table 13.4 Advantages and disadvantages of first-to-file patent filing system
Advantages
[1] No interference case to determine the first author
[2] Eliminate intentional delay of patent filing
Disadvantages
[1] No chance for idea accumulation towards commercial value
[2] Less number of claims per patent application
[3] Very high patent filing cost
[4] Risk for hacker stealing the electronic file that can be easily
copied in this networked computer world
Table 13.5 Advantages and disadvantages of first-to-invent patent filing system
Advantages
[1] Possible for idea accumulation towards commercial value
[2] Has time for prototype development
[3] More claims per patent application
[4] Lower patent filing cost
Disadvantages
[1] Public notary service used to prove the first inventor is not
efficient and practical by referring to the exemplary case of the
laser inventor of Gordon Gould which has lasted for 30 years
[2] Interference case to determine the first inventor is hard
[3] Intentional delay of patent filing for public disclosure
239
Table 13.6 Advantages & disadvantages of limited first-to-invent patent filing system
Advantages
[1] Possible for idea accumulation towards commercial value
[2] Has time for prototype development
[3] More claims per patent application
[4] Lower patent filing cost
[5] Digital timestamp is more efficient and practical than public
notary service.
[6] Interference case to determine the first inventor is easier
[7] Reasonable delay of patent filing for public disclosure
Disadvantages
[1] Need survey and research to determine the window period
between the first date of invention claim and first patent filing
date, which is suggested to be from 1 to 2 years.
[2] Need international revision of patent law, especially PCT under
the WIPO that may take a long time
240
CHAPTER 14 HACK-PROOF DATA STORAGE USING
INNOVATED DIP SWITCH
14.1 Abstract
A dual in-line package (DIL/DIP) switch has been modified to collectively
link all the poles using a single actuator and called secure DIP switch. The actuator
can be a raised/recessed slide, raised/recessed rocker or piano-type (aka side/level),
selectively switching on or off one/two groups of poles oppositely. A specific
inventive application is when a 10/ 12- way secure DIP switch is integrated with two
modular jack RJ45 sockets and a second storage device preferably via USB
connection, a secure data storage resisting the computer hacking in a malicious
computer network is created. This new component is simple, cost-effective, and
hack-proof. Yet a novel variant is N1PST+N2PST DIP switch with reverse activation.
14.2 Introduction
Hacking or cracking into a computer from a malicious computer network
(Wikipedia Contributors, 2007q, 2008n) is a great threat to the information security
of private and confidential data in this electronic society. History of hacking and
cracking can be traced (Wikipedia Contributors, 2008n). To resist the hacking and
cracking, network settings and firewall software (Ogletree, 2000) are among the
available best tools. However, these tools are complicated and not user-friendly to a
networking novice like common Internet user. They are only good to network
administrator who has undergone training and/or understood the operating manual.
In other words, network settings and firewall software are excellent at the
server side but not the client side. Technical difficulty and affordable cost are two
main factors discouraging the users to adopt these two anti- hacking approaches
effectively. Furthermore, end users normally do not require data sharing via web
hosting like server. This indicates that private and confidential data of end users can
actually be partitioned from the data without security concern. For more information
on the imperative demand of hack-proof data storage, please refer to Section 13.2.4.
241
In addition to the financial loss of confidential information and business
secret, there are cronies of organized crime using the hacked secrets, flash mob
approach, and sound snatching to conspire for more serious crimes like to worsen a
good human relationship and/or to fasten a cheating human interaction. Married
couples may be made divorced. Lovers may be made suspicious between themselves.
Relatives, friends, colleagues, and organization members may be made trust-less and
negatively emotional. Cheaters may succeed to establish trust, cultivate positively
false emotion, and build a dishonest relationship leading to a marriage for sharing or
even controlling the power, wealth, reputation, and fame of a single man or woman
with good social status. In short, the criminals may cheat for sex, trust, emotion,
power, money, and assets.
Here, method and device are proposed to secure a hacking-free (or hack-
proof) data storage for end users. This method uses a new component called secure
DIP switch integrated with two modular jack sockets and a second storage device
like hard disk drive (HDD) or USB (Universal Serial Bus) flash drive. Private and
confidential data is stored in the second storage device. Secure DIP switch controls
the normal networking mode while it is switched into one direction and hacking-free
mode while it is switched into the opposite direction. This method is simple, cost-
effective, and hack-proof. End users can use this method to have hacking-free
working environment without risking the firewall.
14.3 Related Prior Arts
Besides complicated networking settings and firewall software, a simple
hardware device was proposed by Fonseca (2003) by using a simple push/pull level
of a switch box to connect or disconnect the networking connection for the hacking
elimination. Fonseca called it as data line switch and filed for patent in the US on 24
July 2001. Later, Macuch (2005) designed the data line switch for the applications of
coaxial and DSL cables to control the computer connection to the Internet. Macuch
filed for a design patent in the USA on 17 November 2003. Of course, there is yet
another current practice by some end users to plug and unplug the networking cable.
242
Nevertheless, this method suffers from the hook damage of RJ45/RJ11 and
inconvenience access of networking port.
Here, a proposed component with similar function to data line switch is also
applicable to modular jack (aka modular connector) (Wikipedia Contributors, 2007m)
like RJ45 and RJ11. Modular connector was firstly invented by Hardesty (1975),
who filed it for patent in the US on 6 July 1973. RJ stands for registered jack
(Wikipedia Contributors, 20071). RJ45 and RJ11 are used as Ethernet jack and
telephone jack, respectively. Our new component is innovated from the dual in-line
package (DIL/DIP) switch by adding a collective actuator, which can be slide, rocker,
or piano-type (aka side/level).
The miniature DIP switch was found in the US patent database to be firstly
invented by Lockard (1977, 1979), who filed for patent in the US on 25 March 1975
for the first time. Since then, there are various innovations on the DIP switch.
Hoffman (1982) had improved the manufacturing of DIP switch. Liataud and
Maloney (1983) had reduced the size, decreased the cost, and increased the reliability
of DIP switch. Brown (1983) had created the piano-type DIP switch. In the late
decade, Lin (1999) and Tai (2001) from Taiwan, R.O.C., had concomitantly
decreased the size, improved the manufacturing process, and increased the reliability
of DIP switch.
Normal slide switch wipes in parallel with the pin pairs. The slide actuator of
our proposed component wipes transversely to the pin pairs. The first slide switch
that can be found in the US patent database was invented by Bailey (1969). Even
though the wiping directions of normal slide switch and our switch are different by
90° degrees, their function is the same, i.e. to connect and disconnect the poles,
except the 10- way secure DIP switch oppositely switches two groups of poles.
14.4 Proposed Secure DIP Switch
For conventional n-way nPST (n Poles Single Throw) DIP switch, all the n
poles are independently switched on or off in parallel with the pin pairs 101 and 102.
A simple structural diagram of a 10-way DIP switch is shown in Figure 14.1. Here, a
modified DIP switch called secure DIP switch is innovatively proposed, where all
243
the individual switches of the DIP switch are joined and controlled simultaneously
by a transverse slider acting as an actuator in Figure 14.2. Alternative actuators are
raised/recessed slide, raised/recessed rocker, and piano-type (aka side/level). When a
USB connection is considered, an 8-way secure DIP switch for Ethernet cable will
become 10/ 12- way, or an extra 2/4- way secure DIP switch. The slider 103 can be
wiped transversely to the pin pairs 104 and 105 to either switch on the networking
connection and off the connection of the second storage device, or oppositely. This
means secure DIP switch is 10/ 12- way nPDT (n Poles Double Throws).
101
> 102
Figure 14.1 Structural diagram of conventional 10-way DIP switch
104
y io5
Figure 14.2 Structural diagram of proposed 10/12-way secure DIP switch
244
There are two groups of poles in opposite connections: 8-way RJ45/RJ1 1
networking connection and 2/4-way USB connection. 10Mbps and 100Mbps
Ethernet over twisted pair can use 4-way connection, but 1 Gbps/ 1 000Mbps Ethernet
must use 8-way connection. For USB connection, it can be 4 ways or 2 ways by
saving the power and ground cables. It is then integrated with two RJ45 sockets and
two USB sockets to form a simple and cost-effective innovation (Lee, 2008a, 2008b,
2008c).
If Category 5/5e cable (Wikipedia Contributors, 2007p) defined in
ANSI/TIA/EIA-568-A and TIA/EIA-568-B (Wikipedia Contributors, 2007k),
respectively, is used, the RJ45 socket will be backwards compatible with RJ11 for
two running pairs and one running pair, respectively.
14.5 Method and Device to Secure Hacking-Free Data Storage
Insofar as the secure DIP switch is specifically designed for a method and
device to secure a hacking-free data storage. An 8/10- way secure DIP switch is
integrated with two modular connector RJ45 sockets to connect or disconnect the
networking connection, and two optional USB sockets to oppositely disconnect or
connect the second storage device on a PCB (Printed Circuit Board). The integration
without USB sockets functioning as an RJ switch can be implemented as a wall plate
for new installation or as an external interconnection box for old design and
inconvenient switch access.
For the computer of the end user, a second storage device is needed. This can
be either an internal or external hard disk drive (HDD). It can also be a USB flash
drive. For external HDD and USB flash drive, they are hot-swappable when USB
port is used. For internal HDD of the type of SATA (Serial Advanced Technology
Attachment), a switch is needed to control the data connection. This switch called
HDD switch can be an 8-way secure DIP switch installed at the back panel of
computer with old design or at the front panel of computer with new design.
Similarly, the connection of external HDD and USB flash drive via USB port can
adopt a 2/4-way switch. This can get rid of the plug-and-play which can cause
reliability problem after frequent plugging and unplugging.
245
For a real implementation, an RJ switch is constructed as an interconnection
box from an 8-way secure DIP switch and two RJ45 sockets. The end user uses a
computer connected to an external HDD via USB port. The storage device can also
be a USB flash drive. There is an Ethernet cable connecting the computer and the
RJ45 socket of the interconnection box. Another Ethernet cable connects the second
RJ45 socket of the interconnection box and the networking wall plate. Clearly, these
can be easily understood by any normal end user. The 8-way switch can also be
made 10/12-way if the optional USB connection is added. Then, there are two
operating modes as in Table 14.1.
Table 14.1 Operating modes of method and device to secure hack-proof data storage
Operating Mode
Networking Connection
Second Storage Device
Hacking-free
Disconnected
Connected
Network access
Connected
Disconnected
For secure hacking-free operating mode, the actuator is switched to
disconnect the networking connection and then connect the second storage device.
The end user can create, open, modify, and store one's private and confidential data
in the second storage device. When network access is needed, the second storage
device is disconnected and then the network is connected. The end user can now surf
the Internet and one's data in the second storage device is safe from hacking via the
malicious computer network. Once the demand for network access has finished, the
end user can switch back to the hacking-free operating mode to manipulate the
private and confidential data.
14.6 Costs and Reliability
The current cost of a DIL switch in Malaysia ranges from MYR$3.88 to
MYR$46.77 depending on the contact ratings of voltage and current as well as the
operating life (Farnell, 2007). The FOREX (Foreign Exchange) of USD$1.00 was
about MYR$3.50 in September 2007 and October 2008. Mass purchase over 500
pieces can reduce the unit price of DIL switch to MYR$2.56. Subsequently, it can be
246
claimed that the added manufacturing cost is low and yet the added value of hacking-
free data storage is high.
The voltage and current of secure DIP switch will depend on the power over
the Ethernet cable (i.e. PoE (Power over Ethernet), PoL (Power over LAN) or Inline
Power) (Wikipedia Contributors, 2007o), phone cable and USB connection.
Supplying power over Ethernet is strongly recommended to follow the IEEE
Standard. Clause 33 of "IEEE 802.3-2005 - Section Two" (LAN/MAN Standards
Committee, 2005) provides 48 volts DC over two of the four available pairs on a Cat.
3 / Cat. 5 cable with a maximum current of 400 mA for a maximum load power of
15.4 Watts (Wikipedia Contributors, 2007o).
For the Ethernet cable over LAN in Malaysia, it is normally Cat. 5 T568B
(Wikipedia Contributors, 2007k, 2007p). Contact rating of phone cable for network
usage is below the contact rating of Ethernet cable. If USB power cables travel
through the DIP switch, then it is 4 ways and the contact rating is 5.25 V DC and 500
mA. Otherwise, it needs 2 ways and the contact rating of USB data cables is below
2.8 V and 20 mA for high speed USB 2.0.
The reliability (aka operating life or service life) of DIP switch ranges from
1,000 to 35,000 operations. The death of DIP switch depends on the change of
contact resistance and the mechanical wear out of the actuator. It is expected that the
improvements by Lin (1999) and Tai (2001) can further increased the operating life
of DIP switch in parallel with the reduction of manufacturing materials, weight, and
cost. It is a question on the balance of costs and reliability.
This innovation is expected to be broadly used in the office environment,
where there exists a lot of private and confidential data. If the hacking-free operating
mode and network access operating mode are activated once a day for five times per
week, then the DIP switch can last for 3.85 years for the DIP switch with operating
life of 1,000 operations. The contact ratings, operating life, and cost of DIP switch
are closely correlated. Survey and research are needed for optimum manufacturing
design and supply chain management.
Yet another potentially broad application for men with good social status and
women with good conditions, this hack-proof data storage is also critical to protect
247
their human interaction network, daily itinerary, future plans, and financial accounts
from being maliciously conspired by the cronies of organized crime by using the
hacked secrets, flash mob approach, and sound snatching.
14.7 Other Forms of Innovation
An innovation of the improved 8-way 8PST DIL switch as in Figures 14.1-
14.2 is to become a 10- way 8PST+2PST DIL switch with an actuator activating
8PST and 2PST in opposite direction, where 8PST controls the network connection
of RJ-XX and 2PST is extendable to other nPST to control the hot-swappable USB
or SATA data/power connection to create a hack-proof data storage as in Figure 14.3.
As in Figures 14.1-14.2, the 8-way 8PST DIL switch acting as RJ switch for
wired Ethernet network can be modified to become 4-way 4PST DIL switch acting
as hot-swappable USB switch to control the wireless network connection using the
wireless USB network adapter operating on the wireless communication protocols
like Bluetooth, Wi-Fi, 3G, WiMAX, etc.
630
r
610
620
610
J
620
Figure 14.3 Innovated 10- way 8PST+2PST DIL switch activated in opposite
direction
248
In Figure 14.3, the 10- way 8PST+2PST DIL switch with reverse activation
630 can be modified to have the first 8PST 610 acting as RJ switch or to become
4PST acting as a USB switch for wireless USB network adapter in similarity with
Figures 14.1-14.2, and the second 2PST 620 is extendable to other nPST for other
types of data connection, like SATA and USB, to a storage device like HDD and
USB flash drive.
The improved DIL switch so far can be other types of switch performing
these enhanced functions to create hacking-free data storage, where they can also
switch on and off a few little switches to control the data and power connections like
keylock switch, selector switch, pushbutton switch, rocker switch, rotary switch,
slide switch, toggle switch, etc., with and without a light indicator of network
connection.
There are also some originally novel prototypes for this innovated DIP switch
in the forms of layout-design of integrated circuit in Malaysia (Lee, 2005b, 2006c,
2007b, 2007c, 2007d, 2007e, 2008d, 2008e, 2008f, 2008g).
14.8 Conclusion
Unless there is an advanced hacker who can interpret the weak
electromagnetic radiation across the secure DIP switch, this proposed method and
device for securing a hacking-free data storage can be claimed to be fully resisting
the hacking attacks. It is a simple integration consisting of a secure DIP switch, two
RJ45 sockets, and two optional USB sockets. The proposed switch adds little
manufacturing costs but highly added values, which may be a 10- way switch for a
RJ45/RJ11 and a USB connection. This hacking-free method and device is simple,
cost-effective, and hack-proof.
249
CHAPTER 15 CONCLUSIONS
15.1 Concise Summary
In a nutshell, this doctoral research project has contributed a lot of originally
novel knowledge contribution in the forms of methods, systems, and devices in the
fields of information engineering, generally, and security engineering, particularly.
The ways to evaluate a researcher is firstly discussed followed by the
essential condition to qualify for a doctoral degree. Contribution impact by referring
to the applications of research results for public usages is highly recommended.
Then in the first part, five methods and systems to create big and yet
memorizable secrets are presented in details. These five methods are as follows:
(i)
Chinese-character-encoded passphrase
(ii)
Two-dimensional (2D) key
(iii)
Multilingual key
(iv)
Multi-tier geo-image key
(v)
Multi-factor multimedia key using software token
(vi)
Hybrid combinations of any of the abovementioned five methods
Afterwards, the multimedia noises (or errors), enhanced frequency analysis,
information rate, and unicity distance are studied to show how to increase the
randomness of password/key to get higher entropy and securer protection.
To cater for the demands of multiple unique secrets to support various offline
and online accounts, the multihash key using the hash iteration and hash truncation is
invented here. To create more slave keys from a master key, three methods are
proposed: Using a filename, using a random number, and using a two -tier structure.
Later, there are three variants of multihash key to generate more slave keys. In
addition, multihash key is shown on how to act as a further authentication factor, as
well as simple key escrow method and system.
250
In the second part, applications of secret(s) and MePKC (Memorizable
Public-Key Cryptography) for twelve novel methods and systems are presented.
These applications show the future great contribution impacts that this doctoral
research project can trigger and cultivate. These twelve components are as follows:
(i) Memorizable symmetric key to resist quantum computer attack
(ii) Memorizable public-key cryptography (MePKC)
(iii) Other cryptographic, information- hiding, and non-cryptographic
applications of secret beyond 128 bits
(iv) Identification hardening of embedded data in steganography
(v) Electronic fund transfer using MePKC
(vi) Electronic software licensing using MePKC
^vn; MePKC human-computer and human- human authentication schemes
^vin) MePKC digital certificate having more than one asymmetric key pair
(ix) Three-tier MePKC digital certificates for ladder authentication
(x) Archiving the voice/ video calls of wired/wireless phones
(xi) Multipartite electronic commerce transactions using MePKC
(xuj Trust boosting of MePKC digital certificate by using more than one
certification authority and/or introducer of Trust of Web
Later, the MePKC digital timestamping scheme is proposed to act as the
digital evidence of copyright authorship and/or ownership to replace the SD
(Statutory Declaration) in Malaysia. For generalization, this MePKC digital
timestamping scheme can be applied as other IP (Intellectual Property) evidences,
especially the patent. After having this scheme, as well as knowing the great loss due
to the hacking and economic espionage, an innovated patent filing system called
"limited first-to-invent patent filing system" is proposed. This filing system is the
same as the first-to-invent patent filing system expect that there is a limited window
period from the first date of invention claim to the first patent filing date. This period
251
shall be about one to two years awaiting further research, survey, and evaluation. The
MePKC digital timestamping scheme shall be used to act as the IP evidence to prove
the first date of invention claim of this limited first-to-invent patent filing system.
Lastly, to secure the plaintext and decrypted ciphertext in the networked
computer system, the MePKC by itself is not enough due to the threat of virtual
hacking over the malicious and insecure computer communications network. Here, a
hack-proof (or hacking-free) data storage using an innovated DIP (Dual In-Line
Package) switch together with a second data storage device is proposed to secure the
plaintext and decrypted ciphertext. The files in the second data storage are always
offline whenever the computer has an Internet connection. When there is a need to
use the files in the second data storage, then the DIP switch has to switch off the
Internet connection first before activating the second data storage.
Let's create and maintain a networked info-computer age for a more
paperless, petroleum-less, and environment-friendly human society by having safer
multipartite electronic computer communications as from the original and novel
knowledge contribution of this research project.
15.2 Other Supporting Reading Materials in This Research Project
15.2.1 NIST Publication
NIST (National Institute of Standards and Technology), USA, has a lot of
publications on information engineering, generally, and security engineering,
particularly. These publications are very useful for further reading to discover and
cultivate novel and innovative ideas in applying the research outputs of this thesis.
The list of these NIST publications include personal identity verification (PIV)
card (Branstad, Clay & Hash, 2005; NIST, 2005a, 2005b, 2006b; Dray, Giles, Kelley
& Chandramouli, 2006; McCallister & Ferraiolo, 2006; MacGregor, Schwarzhoff &
Mehta, 2007; Polk, Dodson & Burr, 2007; Bailey, Chandramouli, Ghadiali &
Branstad, 2008), discrete logarithm cryptography (Barker, Johnson & Smid, 2007),
information security handbook (Bowen, Hash & Wilson, 2006; NIST, 2006d, 2007a,
2008; Singhal, Winograd & Scarfone, 2007; Tracy, Jansen, Scarfone & Winograd,
252
2007), security requirements (NIST, 2001, 2004, 2006a, 2007d; Dent & Mitchell,
2004; Campbell & Easter, 2007a, 2007b, 2007c, 2008), wireless security
(Karygiannis & Owens, 2002; Frankel, Eydt, Owens & Scarfone, 2007; Scarfone &
Dicoi, 2007), SSL (Frankel, Hoffman, Orebaugh & Park, 2007), RFID (Radio
Frequency Identification) (Karygiannis, Eydt, Barber, Bunn & Phillips, 2007),
glossary of key information security terms (Kissel, 2006), public-key cryptography
(Nechvatal, 1991), computer authentication (NIST, 1985a, 1994b, 1997), key
management (NIST, 1992), password (NIST, 1993), escrowed encryption (NIST,
1994a), computer security (NIST, 1995b), HMAC (Keyed-Hash Message
Authentication Code) (NIST, 2002a, 2007c), electronic mail (Email) (Tracy, Jansen,
Scarfone & Butterfield, 2007), biometrics (Wilson, Grother & Chandramouli, 2007),
and application- specific key management guidance (Barker, Burr, Jones, Polk, Rose
& Smid, 2008).
15.2.2 Security and Privacy
Besides the security, the entity privacy of an individual, family, and
organization has to be considered as well. Debra S. Herrmann (2007) has written a
book entitled "Complete Guide to Security and Privacy Metrics" for anyone would
like to know more about security and privacy in applying and implementing the
research outputs from this thesis.
15.2.3 Other Resources
There are also other resources of reading materials for interested readers to
know more. These include etymology dictionary of Malay language (Chong, 1997)
to know the relationship among various languages, font formats (Wikipedia
Contributors, 2008aj, 2008ak) for various styles to check the possibility to enlarge
the key space of multilingual key, computer (Stallings, 2006a), computer
communications network security (Stallings, 2000, 2005, 2006b, 2007);
cryptography (Koblitz, 1994; Nichols, 1999), practical crypto system implementation
(Ferguson & Schneier, 2003), open source network security tools (Schiffman, 2003),
as well as finger reading (Lee, Tang, Chen & Fang, 2002) to know the existence of
253
ESP (Extra-Sensory Perception) in particular and psychic abilities in general
(Parapsycho logical Association, No date; Mitchell, 1974; Ostrander & Schroeder,
1974; Liu, 2001; Editors of Time-Life Books, 2004a, 2004b; Wikipedia Contributors,
2008bk, 2008bl, 2008bm, 2008bn, 2008bo, 2008bp) for the leaking possibilities of
key the secret.
15.3 Suggestions for Future Research
While reading the recommended supporting reading materials for this
research project, readers may also consider developing any of the suggested research
topics as discussed in this Section 15.3.
15.3.1 Fixed-Width Font Supporting All the Unicode Graphic Symbols
For current font file format, it can only support up to 65々3o characters or
graphic symbols. This is insufficient for multilingual key if all the Unicode graphic
symbols have to be included into a single font rile. Moreover, the future enlarged
font file to support all the Unicode graphic symbols has to be fixed-width font. This
is a potential IP (Intellectual Property) of design patent (aka industrial design) and
copyright to be developed in the coming future by interested person(s).
15.3.2 512-Bit Multihash Key Needs Hash Function beyond 1024 Bits
So far the popular and security intensively tested hash function is SHA
(Secure Hash Algorithm) family. The longest message digest of this SHA is SHA-
512 of SHA- 2 with 512 bits. This has limited the application of multihash key to
256-bit security for symmetric key and 128-bit security with 30-year protection for
asymmetric private key. To achieve the higher security strength at 256 bits of
symmetric key strength for 512-bit asymmetric private key, multihash key needs to
use 1024-bit hash function to generate 512-bit final slave key.
For 1024-bit hash function, there exists a scalable polymorphic hash function
(Roellgen, No date) to achieve this kind of message digest. Nevertheless, its security
254
strength is not well tested by the peer researchers in information security. Therefore,
while NIST is in the process of opening an website to accept the recommendation of
SHA-3, even though its maximum hash value requirement is 512 bits, related
researchers have to prepare themselves to go for a longer message digest up to 1024
bits to realize the 256-bit to 512-bit MePKC (Memorizable Public-Key
Cryptography).
15.3.3 MePKC Extension to Other Non-Conventional Cryptographic Schemes
In this thesis, the MePKC has been applied for encryption, digital signature,
authentication, digital cheque (aka electronic cheque), software licensing, public-key
certificate of public-key infrastructure (PKI), BAP (Byzantine Agreement Protocol),
electronic commerce, multihash signature, and digital timestamping.
Besides these conventional cryptographic schemes, interested researchers
may apply MePKC for other non-conventional cryptographic schemes like key
exchange, blind signature, multisignature, group-oriented signature, undeniable
signature, threshold signature, rail- stop signature, group signature, proxy signature,
signcryption, forward- secure signature, designated- verifier signature, copy protection,
electronic cash, electronic voting, MAC (Message Authentication Code), key escrow,
online verification of credit card, etc.
The blind signature scheme includes its further applications for electronic
cash (aka e-cash, electronic money, e-money, electronic currency, e-currency, digital
cash, digital money, digital currency, or scrip), and electronic voting (aka e-voting,
electronic election, e-election, electronic poll, e-poll, digital voting, digital election,
or digital poll).
15.3.4 Big Secret(s) for Information-Hiding and Non-Cryptographic
Applications
In addition to the big secret(s) applications for cryptographic schemes,
Section 9.4 has listed other applications of big secret(s) including the information
hiding and non-cryptographic applications. The information-hiding applications
255
include steganography, symmetric watermarking, and asymmetric watermarking.
The non-cryptographic applications are to be the seeds of PRNG (Pseudo-Random
Number Generator) and CSPRNG (Cryptographically Secure PRNG).
Hence, there are lots of spacious rooms to evaluate the key sizes and
corresponding bits of strength of these other applications of big secret(s). It is highly
expected for the existence of some literatures about their practically secure key
lengths and protection periods like the cryptographic schemes ("Cryptographic Key
Length Recommendation," No date; E. Barker, W. Barker, Burr, Polk, & Smid,
2007a, 2007b; Gehrmann & Naslund, 2005, 2006, 2007).
15.3.5 Safety Box Using Computerized Lock
For safety box using computerized lock (Domenicone, 2000), its key pad is
purely numeric and the display panel is single-line. The short-term memory limits of
digits have been studied by Miller (195bj to be an average of 7 items plus or minus 2
(7 土 2) (Jones, 2002; Doumont, 2002), and further studies show that they depends on
languages (Jones, 2002) in general and phonological short-term memory of 2- second
period (Baddeley, Thomson & Buchanan, 1975) in particular. It is 9.9 digits in
Chinese language (Hoosain & Salili, 1988) and 5.8 digits in Welsh language (Ellis &
Hennelly, 1980).
In other words, for single-line numeric passcode of this type of safety box, a
user using English, Chinese, or Welsh language will have a passcode with average
entropy of 23.25, 32.89, or 19.27 bits. The strength of these key lengths is insecure
whenever a brute force attack can be launched towards the safety box.
Therefore, 2-dimensional (2D) key is highly appreciated to be applied into
the safety box using computerized lock. For the key pad, it can remain to be purely
numeric in decimal digits or enlarged to become in hexadecimal digits.
15.3.6 Provable Security Studies
The only researcher, who is Kok-Wah Lee @ Xpree Jinhua Li, contributing
to the originally novel knowledge in this thesis, is educated in electrical engineering
256
in general and computer communications in particular. Hence, a lot of the proofs of
the inventions and innovations here are based on building up engineering prototypes.
Consequently, researchers in provable security, who are also mathematicians, are
expected to analyze thoroughly the security strength and loopholes of the algorithms,
methods, systems, devices, and apparatuses in security engineering as proposed in
this thesis.
15.3.7 Statistical Surveys for Various Security Schemes
Besides the provable security research over the inventions and innovations
proposed here, researchers in statistics can also consider conducting surveys like
some surveys (Adams & Sasse, 1999; Schneier, 2006; Florencio & Herley, 2007) to
know about the minimum, mean, maximum, and median key lengths of those
methods and systems to create big and yet memorizable secret as proposed here.
Similar statistical surveys can also be carried out for multihash key to know the
statistical values of master keys and slave keys.
15.4 Conclusions
To emphasize for the thrice time on the imperative aim of this research
project, here is the last paragraph.
Let's create and maintain a networked info-computer age for a more
paperless, petroleum-less, and environment-rnendly human society by having safer
multipartite electronic computer communications as from the original and novel
knowledge contribution of this research project.
257
to
ᄂ n
oo
Figure A. 1 Writing systems of the world
Reference: WiKipedia Contributors. (2008, August 27). Writing system, [Online]. Wikipedia the Free Encyclopedia.
Available: http://en.wiKipedia.Org/wiki/Image:WritingSystemsoftheWorld4.png [2008, September 1].
4
KIipM/l/lllMeCKIlll aJ({)clD[lT
ᄂ" |U -
-T^i^ — ^Sf^ ひ!
ュ』 _::^^&
ᅮ ト. c
ね
字
« aiwc Art
^두
nnwvwaC ン I 대
t cwy-
*
リ aw
I 쑈 k
-, 에1、
wis A WAITING ^^Hi^ or^ Hfflw WOIiLD
Legend of writing systems of the world today:
Latin (alphabetic)
Cyrillic (alphabetic)
國 Hangul (featural alphabetic)
I Other alphabets
Arabic (abjad)
國 Other abjads
國 Devanagari (abugida)
Other abugidas
I Syllabaries
Chinese characters (logographic)
Table A. 1 Functional classification of writing systems
Type
Symbol Representation
Example
Pictographic
Pictorgram or iconic picture
Hieroglyph, Cuneiform
Ideographic
Ideogram
Way-finding sign, mathematical notation
Logographic
Morpheme
Chinese character
Syllabic
Syllable
Japanese kana
Alphabetic
Phoneme (consonant or vowel)
Latin alphabet
Abugida
Phoneme (consonant + vowel)
Indian Devanagari
Abjad
Phoneme (consonant)
Arabic alphabet
Featural
Phonetic feature
Korean hangul
259
Table A. 2 List of languages by number of native speakers
Language
Family
Ethnologue (Y2005)
1. Mandarin
^ m o- Tibetan Ch in e se
873,000,000
2. Hindi + Urdu
Indo-European, Indo- Iranian, Indo- Aryan
366,000,000
3. Spanish
Indo-European, Italic, Romance
358,000,000
4. English
Indo-European, Germanic, West
341,000,000
5. Arabic
Afro- Asiatic, Semitic
206,000,000
6. Portuguese
Indo-European, Italic, Romance
177,500,000
7. Ben
Indo-European, Indo- Iranian, Indo- Aryan
171,000,000
8 ᅵ Russian
Indo-European, Slavic, East
170,000,000
9. Japanese
J ap an e se-Ryukyu an
122,000,000
10. Cierman
Indo-European, Germanic, West
100,000,000
11. Punjabi
Indo-nuropean, Indo- Iranian, Indo- Aryan
88,000,000
12. French
Indo-European, Italic, Romance
79,572,000
13. Wu
Sino-Tibetan, Chinese
77,200,000
14. Javanese
Austronesian, Malayo-Polynesian, S 皿 da-Sulawesi
75,500,000
15. Korean
Considered either language isolate or Altaic
74,000,000
16. Telu2u
Dr a vidian South Central
69,700,000
17. Marathi
Indo-European, Indo- Iranian, Indo- Aryan
68,000,000
18. Vietnamese
Austro- Asiatic, M on - Khmer , Vietic
67,400,000
19. Tamil
Dra vidian, Southern
66,000,000
20. Italian
Indo-European, Italic, Romance
61,500,000
21. Cantonese
^ m o- Tibetan Ch in e se
54,800,000
22. Sindhi
Indo-European, Indo- Iranian, Indo- Aryan
54,500,000
23. Turkish
Altaic, Turkic, Oghuz
50,625,000
24. Min
5 m o- Tibetan Ch in e se
46,200,000
25. (Jujarati
Indo-European, Indo- Iranian, Indo- Aryan
46,100,000
26. Maithili
Indo-nuropean, Indo- Iranian, Indo- Aryan
45,000,000
27. Polish
Indo-European, Slavic, West
42,700,000
28. Ukrainian
Indo-European, Slavic, East
39,400,000
29. Persian
Indo-European, Indo-Iranian, Iranian
39,400,000
30. Malayalam
Dravidian, Southern - India
35,800,000
31. Kannada
Dravidian, Southern
35,400,000
32. Tamazight
Afro-Asiatic, Berber, Northern
32,300,000
Ref.: Wikipedia Contributors. (2008ad, July 22). List of languages by number of native speakers,
[Online]. Wikipedia the Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Lis ᄂ of_languages_by_number_of_native_speakers&
oldid=227300820 [2008, July 23].
260
APPENDIX B CHILD-MADE 2D KEYS
Authored by Wei-Dong Chui (徐伟 栋), Wei-Jian Chui (徐伟 坚), and Kok-Wah Lee (李 国华)
in January 2009
In this part, it is shown that children are also capable to create simple 2D keys by using the
key styles of ASCII art to draw some Chinese characters. The authors of these child-made 2D keys in
January 2009 in this Appendix B are 13-year-old Wei-Jian Chui born in 1996 (Figure B.l) and 9-year-
old Wei-Dong Chui born in 2000 (Figure B.2). To get the key size of every 2D key, just multiply the
number of ASCII characters of a 2D key by the value of 6.57 bits, or to be more accurate log 2 95. A
note here: Kok-Wah LEE being the main author has integrated each four Chinese characters created
by them to form a meaningful Chinese phrase for easy remembrance.
AAAAAA
AAAAAA
AVVVVA
AAAAAA
WWW
AAAAAA
AAAAAA
AAVVAA
AAVVAA
AAVVAA
WWW
AAVVAA
AAVVAA
AAVVAA
AAAAAA
AAAAAA
AAAAAA
WWW
AAAAAA
AAAAAA
AAAAAA
WWW
VAAAAV
VAAAAV
WWW
VAAAAV
VAAAAV
WWW
Two [二] Ten [十] One [一] Day [日]
Figure B.l 2D keys using ASCII art and Chinese characters meaning "twenty one days" [二^ 日]
AVVVVA
AAAAAA
WWW
AAVAAA
AVAAVA
WWW
AAAAAV
Cloud [云]
AVVVVA
AAAVAA
AAAVAA
WWW
AAVVAA
AVAAVA
VAAAAV
Sky [天]
AAAAAA
AAAAAA
WWW
AAVVAA
AAVVAA
WWW
AAAAAA
Job [ェ]
AAAVAAA
AAAVAAA
VVVVVVV
AAVVVAA
AVAVAVA
VAAVAAV
AAAVAAA
Wood [木]
Figure B.2 2D keys using ASCII art and Chinese characters meaning "cloudy sky nurtures the woods"
[云 天工 木]
261
REFERENCES
[I] 1790 Analytics Patent Analysis Intellectual Property Evaluation, [Online]. (No date).
Available: http://www.1790analytics.com [2008, September 3],
[2] Abadi, M., Bharat, K., and Marais, J. (2000, October 31). System and method for generating
unique passwords. USPTO Issued Patent US6141760, Filing Date: 31 October 1997, Issue
Date: 31 October 2000.
[3] Abadi, M., Lomas, T. M. A., and Needham, R. (1997, December 16). Strengthening
passwords (Tech. Rep. No. SRC- 1997-033). Palo Alto, CA, USA: Hewlett-Packard
Company, HP Labs, Systems Research Center (SRC).
[4] Abadi, M., Needham, R. M., and Lomas, T. M. A. (2000, June 20). Method and apparatus
for strengthening passwords for protection of computer systems. USPTO Issued Patent
US6079021, Filing Date: 2 June 1997, Issue Date: 20 June 2000.
[5] Abril, P. S., and Plant, R. (2007, January). The patent holder's dilemma: buy, sell, or troll?
Communications of the ACM, 50(1), 37-44.
[6] Adams, A., and Sasse, M. A. (1999, December). Users are not the enemy. Communications
of the ACM, 42(12), 41-46.
[7] Adams, A., Sasse, M. A., and Lunt, P. (1997, August 12-15). Making Passwords Secure and
Usable. Proceedings of the HCI on People and Computers XII, Bristol, UK, 1-19.
[8] Aguilera, M. K., and Toueg, S. (1999, August 27). A simple bivalency proof that t-resilient
consensus requires t+1 rounds. Information Processing Letters, 77(3-4), 155-158.
[9] Aharonian, G. (No date). Patent/copyright infringement lawsuits/licensing awards, [Online].
Source Translation and Optimization (STO). Available:
http://www.bustpatents.com/awards.htm [2007, October 10].
[10] Ahuja, V. (2000, May/June). Building trust in electronic commerce. IT Professional, 2(3),
61-63.
[II] Allan, A. (2004, December 6). Passwords are near the breaking point (Tech. Rep. No.
Gartner G00124970). Stamford, CT, USA: Gartner, Inc.
262
[12] Anderson, M., Jaffe, R, Hibbert, C, Virkki, J., Kravitz, J., Chang, S., and Palmer, E. (2000,
February 1). Method and system for processing electronic documents. USPTO Issued Patent
US6021202, Filing Date: 19 December 1997, Issue Date: 1 February 2000.
[13] Anderson, M., Jaffe, F., Hibbert, C, Virkki, J., Kravitz, J., Chang, S., and Palmer, E. (2001,
March 27). Method and system for processing electronic documents. USPTO Issued Patent
US6209095, Filing Date: 31 August 1999, Issue Date: 27 March 2001.
[14] Anderson, R. (2001). Security engineering: A guide to building dependable distributed
systems. New York, NY, USA: John Wiley & Sons, Inc.
[15] Anderson, R. J., and Petitcolas, F. A. P. (1998, May). On the limits of steganography. IEEE
Journal on Selected Areas in Communications, 7(5(4), 474-481.
[16] Arnold, M., Schmucker, M., and Wolthusen, S. D. (2003). Techinques and applications
digital watermarking and content protection. Norwood, MA, USA: Artech House, Inc.
[17] Aronson, E., and Gerard, E. (1966, March). Beyond Parkinson's law: The effect of excess
time on subsequent performance. Journal of Personality and Social Psychology, 3(3), jj6-
339.
[18] Aronson, E., and Landy, D. (1967, July). Further steps beyond Parkinson's Law: A
replication and extension of the excess time effect. Journal of Experimental Social
Psychology, 3(3), 274-285.
[19] Atreya, M., Hammond, B., Paine, S., Starrett, P., and Wu, S. (2002). Digital signatures.
Berkeley, CA, USA: McGraw-Hill/Osborne.
[20] Baddeley, A. D., Thomson, N., and Buchanan, M. (1975, December). Word length and the
structure of short-term memory. Journal of Verbal Learning and Verbal Behavior, 74(6),
575-589.
[21] Bailey, D., Chandramouli, R., Ghadiali, N., and Branstad, D. (2008, February). Guidelines
for the accreditation of personal identity verification (PIV) card issuers (PCFs) (、draft)
(NIST Special Publication 800-79-1 (Draft)). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
263
[22] Bailey, J. R. (1969, December 23). Slide switch. USPTO Issued Patent US3485966, Filing
Date: 2 October 1968, Issue Date: 2 October 1968.
[23] Baltzley, C. A. (2000, November 28). Public key crypto system with roaming user capability.
USPTO Issued Patent US6154543, Filing Date: 25 November 1998, Issue Date: 28
November 2000.
[24] Baltzley, C. A. (2001a, August 16). Public key crypto system with roaming user capability.
USPTO Published Patent Application US2001/0014158, Filing Date: 28 March 2001.
[25] Baltzley, C. A. (2001b, September 18). Public key crypto system with roaming user capability.
USPTO Issued Patent US6292895, Filing Date: 19 June 2000, Issue Date: 18 September
2001.
[26] Barham, B., and Foltz, J. (No date). University patenting and scientific advancement,
[Online]. Available: http://www.lafollette.wisc.edu/publicservice/stembarhamfoltz.ppt [2008,
September 3].
[27] Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2007a, March). Recommendation
for key management - Part 1: General (revised) (NIST Special Publication 800-57).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST, 61-71.
[28] Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2007b, March). Recommendation
for key management - Part 2: Best practices for key management organization (NIST
Special Publication 800-57). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[29] Barker, E., Burr, W., Jones, A., Polk, T., Rose, S., and Smid, M. (2008, August).
Recommendation for key management - Part 3: Application-specific key management
guidance (NIST Special Publication 800-57). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[30] Barker, E., Johnson, D., and Smid, M. (2007, March). Recommendation for pair-wise key
establishment schemes using discrete logarithm cryptography (revised) (NIST Special
Publication 800-56A). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center),
NIST.
264
[31] Barker, E., and Kelsey, J. (2007, March). Recommendation for random number generation
using deterministic random bit generators (revised) (NIST Special Publication 800-90).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[32] Barney, J. A., and Barney, J. R. (2003, April 29). Method and system for rating patents and
other intangible assets. USPTO Issued Patent US6556992, Filing Date: 14 September 2000,
Issue Date: 29 April 2003.
[33] Barni, M., and Bartolini, F. (2004). Watermarking systems engineering: Enabling digital
assets security and other applications. New York, NY, USA: Marcel Dekker, Inc.
[34] Batista, P. D., Campiteli, M. G., and Kinouchi, O. (2006, July). Is it possible to compare
researchers with different scientific interests?. Sciento metrics, 68(1), 179-189.
[35] Bauer, F. L. (2002). Decrypted secrets: Methods and maxims of cryptology (3rd ed.). Munich,
Bavaria, Germany: Springer, 271-300.
[36] Bayh, B. (2006, December). Bayh-Dole: Don't turn back the clock. Les Nouvelles, [Online]
20 り <5(December), 215-218. Licensing Executives Society International (LES I). Available:
http://www.lesi.org/BirchBayh/Bayh.pdf [2008, July 17].
[37] Beach, U. [2001, April 15]. How do we manage our expanding collections of passwords and
PINs?, [Online]. CIO.com. Available: http://www.cio.com/article/print/30161 [2008,
September 10].
[38] Beaver, K. (2004). Hacking for dummies. Indianapolis, Indiana, USA: Wiley Publishing, Inc.
[39] Behr, F. Jr., Fossum, V., Mitzenmacher, M., and Xiao, D. (2002). Estimating and comparing
entropies across written natural languages using PPM compression (Tech. Rep. No. TR-12-
02), [Online]. Cambridge, MA, USA: Harvard University, Harvard School of Engineering
and Applied Sciences. Available: ftp://ftp.deas.harvard.edu/techreports/tr-2002.html;
ftp://ftp.deas.harvard.edu/techreports/tr-12-02.ps.gz [2008, July 23].
[40] Behr, F., Fossum, V., Mitzenmacher, M., and Xiao, D. (2003, March 25-27). Estimating and
comparing entropies across written natural languages using PPM compression. Proceedings
of the Data Compression Conference 2003 (DCC 2003), Snowbird, Utah, USA, 416.
265
[41] Bellare, M., Miner, S. K. (1999, August 15-19). A forward-secure digital signature scheme.
Proceedings of the 19th Annual International Cryptology Conference on Advances in
Cryptology 1999 (CRYPTO '99), LNCS 1666, Santa Barbara, CA, USA, 431-448.
[42] Benaloh, J., and de Mare, M. (1991). Efficient broadcast time-stamping ( extended abstract),
[Online]. Technical Report 1, Department of Mathematics and Computer Science, Clarkson
University. CiteSeer. Available: http://citeseer.ist.psu.edu/benaloh91efficient.html [2007,
January 10].
[43] Berinato, S. (2007a, September 17). Hacker economics 1: Malware as a service - Who's
stealing your passwords? Global hackers create a new online crime economy, [Online].
CIO.com. Available: http://www.cio.com/article/print/135500 [2008, September 10].
[44] Berinato, S. (2007b, October 8). Hacker economics 2: The conspiracy of apathy, [Online].
CIO.com. Available: http://www.cio.com/article/print/135550 [2008, September 10].
[45] Berinato, S. (2007c, October 8). Hacker economics 3: MPACK and the next wave of malware.
[Online]. CIO.com. Available: http://www.cio.com/article/print/135551 [2008, September
10].
[46] Berinato, S. (2007d, October 8). Key malware terms - A layman 's glossary of malware terms,
[Online]. CIO.com. Available: http://www.cio.com/article/print/135453 [2008, September
10].
[47] Berinato, S. (2007e, October 8). How Gozi's first second unfolds, [Online]. CIO.com.
Available: http://www.cio.com/article/print/135451 [2008, September 10].
[48] Berinato, S. (2007f, October 8). Death by [Frame, [Online]. CIO.com. Available:
http://www.cio.com/article/print/135452 [2008, September 10].
[49] Bessen, J. (2004). Where have all the great inventors gonel, [Online]. Research on
Innovation. Available: http://www.researchoninnovation.org/GreatInventors.pdf [2008,
August 20].
[50] Beutelspacher, A. (1994). Cryptology (J. C. Fisher, Trans.). Washington, D.C., USA: The
Mathematical Association of America. (Original work published 1991 in German language).
266
[51] Bierly, P. E. III, Kolodinsky, R. W., and Charette, B. J. (No date). Understanding the
complex relationship between creativity and ethical ideologies. Journal of Business Ethics
[Online]. Available: http://dx.doi.org/10.1007/sl0551-008-9837-6 [2008, July 18].
[52] Bishop, M. (2003). Computer security: Art and science. Boston, MA, USA: Addison-Wesley.
[53] Blake, L, Seroussi, G., and Smart, N. (1999, July). Elliptic curves in cryptography. In
London Mathematical Society Lecture Note Series (No. 265). Cambridge, Cambridgeshire,
UK: Cambridge University Press.
[54] Blake, I. R, Seroussi, G., and Smart, N. P. (Eds.). (2005, April). Advances in elliptic curve
cryptography. In London Mathematical Society Lecture Note Series (No. 317). Cambridge,
UK: Cambridge University Press.
[55] Blaze, M., Diffie, W., Rivest, R. ᄂ, Schneier, B., Shimomura, T., Thompson, E., and Wiener,
M. (1996). Minimal key lengths for symmetric ciphers to provide adequate commercial
security. Chicago, Illinois, USA: A Report by an Ad Hoc Group of Cryptographers and
Computer Scientists.
[56] Blonder, G. (1996, September 24). Graphical password. USPTO Issued Patent US5559961,
Filing Date: 30 August 1995, Issue Date: 24 September 1996.
[57] Boatwright, M., and Luo, X. (2007, September 28-29). What do we know about biometrics
authentication? ACM Proceedings of the 4th Annual Conference on Information Security
Curriculum Development 2007, Kennesaw, Georgia, USA, 205-209.
[58] Boneh, D., and Franklin, M. (2006, September 26). Systems and methods for identity-based
encryption and related cryptographic techniques. USPTO Issued Patent US7 113594, Filing
Date: 13 August 2002, Issue Date: 26 September 2006.
[59] Bonnet, M., Baroniunas, W., and Webbink, M. (2008, August 28). Methods and systems for
tracking and auditing intellectual property in packages of open source software. USPTO
Published Patent Application US2008/0209399, Filing Date: 27 February 2007.
[60] Boren stein, N., and Freed, N. (1992, June). Base64 content-transfer-encoding. In Request for
comments ( 1341 ): MIME (Multipurpose Internet Mail Extensions ): Mechanisms for
specifying and describing the format of Internet message bodies (RFC 1341). Sterling,
Virginia, USA: Network Working Group, The Internet Engineering Task Force (IETF).
267
[61] Bose, B. K. (2006). Tips for getting a transactions article published, [Online]. IEEE Power
Electronics Society Newsletter, 2 りり (5(Second Quarter). Available: http://vlsi-
india.org/vsi/download/publications/archive/ieee-trans-tips.pdf [2008, August 2].
[62] Bo wen, P., Hash, J., and Wilson, M. (2006, October). Information security handbook: A
guide for managers (NIST Special Publication 800-100). Gaithersburg, MD, USA: CSRC
(Computer Security Resource Center), NIST.
[63] Boyd, C. (1989). Digital multisignatures, [Online]. In H. J. Beker, and F. C. Piper (Eds.),
Cryptography and Coding (pp. 241-246). Oxford, UK: Oxford University Press. Available:
http://sky.fit.qut.edu.au/~boydc/papers/ima89.pdf [2008, July 15].
[64] Brainard, J., Juels, A., Rivest, R. L., Szydlo, M., and Yung, M. (2006, October 30 -
November 3). Fourth-factor authentication: Somebody you know. Proceedings of the 13th
ACM Conference on Computer and Communications Security (CCS 2006), Alexandria,
Virginia, USA, 168-178.
[65] Branstad, D., Clay, A., and Hash, J. (2005, July). Guidelines for the certification and
accreditation of PIV card issuing organizations (NIST Special Publication 800-79).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[66] Branstetter, L., and Ogura, Y. (2005, August). Is academic science driving a surge in
industrial innovation? evidence from patent citations, [Online]. NBER Working Paper No.
11561. Available: http://www.nber.org/papers/wll561 [2008, September 16].
[67] Bray, M. J., and Lee, J. N. (2000, September-November). University revenues from
technology transfer Licensing fees vs. equity positions. Journal of Business Venturing, 15(5-
6), 385-392.
[68] Breitzman, A. (2006, April 13). Analysis of European patent referencing to IEEE papers,
conferences, and standards, [Online]. IEEE. Available:
http://www.ieee.org/portaVinnovate/freecontent/contentitems/whitepaper2.html [2008,
September 3].
[69] Breitzman, A. (2007, March 1^;. Analysis of patent referencing to IEEE papers, conferences,
and standards 1997-2006, [Online]. IEEE. Available:
http://wwwieee.org/portaycms_docs_iportals/iportals/publications/patentcitation/IEEB_Rep
ort_3-15-2006.pdf.pdf [2008, September 3].
268
[70] Breitzman, A. (2008, May 21). Analysis of patent referencing to IEEE papers, conferences,
and standards 1997-2007, [Online]. IEEE. Available:
http://www.ieee.org/portal/cms_docs_innovate/imiovate/freecontent/pdfs/IEEE_and_Patents
_5-21-08.pdf [2008, September 3].
[71] Breitzman, A. F., and Narin, F. (2001, January 16). Method and apparatus for choosing a
stock portfolio, based on patent indicators. USPTO Issued Patent US6175824, Filing Date:
14 July 1999, Issue Date: 16 January 2001.
[72] Brown, A. S., Bracken, E., Zoccoli, S., and Douglas, K. (2004, June 15). Generating and
remembering passwords. Applied Cognitive Psychology, 18(6), 641-651.
[73] Brown, P. F., Pietra, V. J. D., Mercer, R. L., Pietra, S. A. D., and Lai, J. C. (1982, March).
An estimate of an upper bound for the entropy of English. Computational Linguistics, 18(1),
31-40.
[74] Brown, R. P. (1983, June 21). Side actuated miniature DIP switch. USPTO Issued Patent
US4389549, Filing Date: 23 November 1981, Issue Date: 21 June 1983.
[75] Buck. W. (2000a). Mahabharata. New Delhi, India: Motilal Banarsidass.
[76] Buck. W. (2000b). Ramayana. New Delhi, India: Motilal Banarsidass.
[77] Bugaj, S. V. (1996, June). Passwords for real humans. USENIX Login, 27(3), 41.
[78] Burgess, C., and Power, R. (2008, February 8). Secrets stolen, fortunes lost: Preventing
intellectual property theft and economic espionage in the 21st century. Burlington, MA, USA:
Syngress Publishing (now is at Elsevier' s Science & Technology publishing) (URL:
http://www.syngress.com) (URL: http://www.elsevierdirect.com).
[79] Burr, W. E., Dodson, D. F., and Polk, W. T. (2004, June). Electronic authentication
guideline (NIST Special Publication 800-63 Version 1.0). Gaithersburg, MD, USA: CSRC
(Computer Security Resource Center), NIST.
[80] Burr, W. E., Dodson, D. R, and Polk, W. T. (2006, April). Electronic authentication
guideline (draft) (NIST Special Publication 800-63 Version 1.0.2 (Draft)). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
269
[81] Burr, W. E., Dodson, D. F., Perlner, R. A., Polk, W. T., Gupta, S., and Nabbus, E. A. (2008,
February 20). Electronic authentication guideline (NIST Special Publication 800-63-1).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[82] Cachin, C. (1998, April 14-17). An information-theoretic model for steganography.
Proceedings of the 2nd International Workshop on Information Hiding (IH '98), LNCS 1525,
Portland, Oregon, USA, 306-318.
[83] Callahan, D. W. (2001, August/September). The Ph.D. process. IEEE Potentials, 20(3\ 6-10.
[84] Cameron, K. (2005, May). The laws of identity, [Online]. Microsoft Corporation. Available:
http://msdn.microsoft.com/en-us/lihrary/ms996456.aspx [2008, August 25].
[85] Cameron, K., and Jones, M. B. (2006, January). Design rationale behind the identity
met asy stem architecture, [Online]. Microsoft Corporation. Available:
http://research.miCTOsoft.com/~mbj/papers/Identity_Metasystem_Design_Rationale.pdf
[2008, August 25].
[86] Campbell, J., and Easter, R. J. (2007a, June 14). Security requirements for cryptographic
modules (Annex B): Approved protection profiles for FIPS PUB 140-2 (draft) (NIST FIPS
Pub 140-2 Annex B (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[87] Campbell, J., and Easter, R. J. (2007b, October 18). Security requirements for cryptographic
modules (Annex C): Approved random number generators for FIPS PUB 140-2 (draft) (NIST
FIPS Pub 140-2 Annex C (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security
Resource Center), NIST.
[88] Campbell, J., and Easter, R. J. (2007c, December 18). Security requirements for
cryptographic modules (Annex A): Approved security functions for FIPS PUB 140-2 (draft)
(NIST FIPS Pub 140-2 Annex A (Draft)). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[89] Campbell, J., and Easter, R. J. (2008, January 16). Security requirements for cryptographic
modules (Annex D): Approved key establishment techniques for FIPS PUB 140-2 (draft)
(NIST FIPS Pub 140-2 Annex D (Draft)). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
270
[90] Canning, P. (2006, May 22-25). Monetizing usage of scholarly collections with patent
citation analysis. Proceedings of the 27th IATUL Conference on Embedding Libraries in
Learning and Research (2006 IATUL), Porto, Norte, Portugal.
[91] CastleCops, [Online]. (No date). Available: http://www.castlecops.com [2008, September
25].
[92] Cavoukian, A. (2006, October). 7 laws of identity: The case for privacy-embedded laws of
identity in the digital age, [Online]. IPC (Office of the Information and Privacy
Commissioner) in Ontario, Canada. Available: http://www.ipc.on.ca/images/Resources/up-
71aws_whitepaper.pdf [2008, August 25].
[93] Cayre, R, Fontaine, C., and Furon, T. (2005a, January 17-20). Watermarking security part
one: Theory. Proceedings of the SPIE Conference on Security, Steganography, and
Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, CA, USA, 746-757.
[94] Cayre, R, Fontaine, C, and Furon, T. (2005b, January 17-20). Watermarking security part
two: Practice. Proceedings of the SPIE Conference on Security, Steganography, and
Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, CA, USA, 758-768.
[95] Cayre, R, Fontaine, C., and Furon, T. (2005c, October). Watermarking security: Theory and
practice. IEEE Transcations on Signal Processing, 53(10), 3976-3987.
[96] Chan dr an, P. M. (2007, August 7). Fully loaded - Realizing true potential of the intangible,
[Online]. IPFrontline Magazine of Intellectual Property and Technology, PatentCafe.com.
Available: http://www.ipfrontline.com/depts/article.asp ?id=15652&deptid=3 [2007, August
16].
[97] Chatterjee, S. (No date). Does increased equity ownership lead to more strategically involved
boards?. Journal of Business Ethics [Online]. Available: http://dx.doi.org/10.1007/sl0551-
008-9797-x [2008, July 20].
[98] Chaum, D. (1982, August 23-z5). Blind signatures for untraceable payments. Proceedings of
the 2nd Annual International Crypto logy Conference on Advances in Cryptology 1982 (aka
Proceedings of CRYPTO '82 on Advances in Cryptology) (CRYPTO ( 82), Santa Barbara, CA,
USA, 199-203.
[99] Chaum, D. L. (1988, July 19). Blind signature systems. USPTO Issued Patent US4759063,
Filing Date: 22 August 1983, Issue Date: 19 July 1988.
271
[100] Chaum, D., and van Antwerpen, H. (1989, August 20-24). Undeniable signatures.
Proceedings of the 9th Annual International Crypto logy Conference on Advances in
Cryptology 1989 (CRYPTO ( 89), LNCS 435, Santa Barbara, CA, USA, 212-216.
[101] Chaum, D., and van Heyst, E. (1991, April 8-11). Group signatures. Proceedings of the
Workshop on the Theory and Application of Cryptographic Techniques 1991 (aka
Proceedings of the Advances in Cryptology - Eurocrypt '91), LNCS 547, Brighton, UK, 257-
265.
[102] Chen, B. X. (2008, October 8). Google's super satellite captures first image, [Online].
Wired.com. Available: http://blog.wired.com/wiredscience/2008/10/geoeye-l-super.html
[2008, October 10].
[103] Chen, M. H. [陈明 华], (2004, November). 有组织 犯罪 问题对 策 研究 [Strategic study of
organized crime problems]. Beijing [:! 匕 iP、J, China [中国]: Publishing House of China
University of Political Science and Law [中 国政 法 大学 出 te 社], (in Chinese language).
[104] Chong, M. W. (1997). Ramus etimoiogi bahasa Melavu [Etymology dicuonary of Malay
language]. Shah Alam, Selangor, Malaysia: Penerbit Fajar Bakti Sdn. Bhd. (in Malay
language).
[105] CLJ Legal Network Sdn. Bhd. (1998). Solid Gold Publishers Sdn. Bhd. v. Chan Wee Ho &
Ors [1998] 5 CLJ /^5. In Law Database of Malaysia, [Online]. Available:
http://www.cljlaw.com [2008, May 20].
[106] Cohen, H., and Frey, G. (2006). Handbook of elliptic and hyperelliptic curve cryptography.
Boca Raton, FL, USA: Taylor & Francis Group, Chapman & Hall/CRC
[107] Collberg, C. S., and Thomborson, C. (2002, August). Watermarking, tamper-proofmg, and
obfuscation - Tools for software protection. IEEE Transactions on Software Engineering,
25(8), 735-746.
[108] Comer, D. (Ed.). (1993). How to write a PhD dissertation or bedtime reading for people who
do not have time to sleep, [Online]. Available:
http://homes.cerias.purdue.edu/~spaf/Archive/dec.html [2008, August 2].
272
[109] Computing reviews, [Online]. (No date). ACM (Association for Computing Machinery).
Available: http://www.reviews.com [2008, August 21].
[110] Cooke, M. J., and Lebby, G. L. (1998, March 8-10). An optimal design for multilayer
feedforward networks. Proceedings of the 30th Southeastern Symposium on System Theory
1998 (SSST 1998), Morgantown, WV, USA, 507-511.
[Ill] Corell, S. (2000, May 1). Ten risks of PKI: In favour of smart card-based PKL Network
Security, 2000(5), 12-14.
[112] Coster, R. (2002, April). From first-to-invent to first-to-file: The Canadian experience,
[Online]. American Intellectual Property Law Association, Arlington, VA, US. Available:
http://www.torys.com/publications/pdf/ARTech-19T.pdf [2007, October 19].
[113] Cover, T. M., and King, R. C. (1978, July). A convergent gambling estimate of the entropy
of English. IEEE Transactions on Information Theory, 24(4), 413-421.
[1 14] Cowan, N. (2001). The magical number 4 in short-term memory: A reconsideration of mental
storage capacity. Behavioral and Brain Sciences [Online], 24(1), 87-185. Available:
http://www.bbsonline.Org/documents/a/00/00/04/46/index.html [2008, July 21].
[115] Cox, I. J., Doerr, Q, and Furon, T. (2006, November 8-10). Watermarking is not
cryptography. Proceedings of the 5th International Workshop on Digital Watermarking 2006
(IWDW 2006), LNCS 4283, Jeju Island (aka Jejudo), Jeju Province (aka Jeju-do), South
Korea, 1-15.
[116] Cox, L, Miller, M., Bloom, J., and Fridrich, J. (2007, November 16). Digital watermarking
and steganography (2nd ed.). San Fransisco, CA, USA: Morgan Kaufmann Publishers, Inc.
[117] Cryer, P. (2000). The research student's guide to success (2nd ed.)- Buckingham,
Buckinghamshire, UK: Open University Press.
[118] Crystal, D. (1999). The Penguin dictionary of language (2nd ed.). Middlesex, England:
Penguin Books.
[119] Cryptographic Key Length Recommendation, [Online]. (No date). Available:
http://www.keylength.com [2008, October 23].
273
[120] Curzon, L. B. (1998). Dictionary of law (4th ed.). Kuala Lumpur, Malaysia: International
Law Book Services.
[121] Dang, Q. (2007a, July 18). Randomized hashing digital signatures (draft) (NIST Special
Publication 800-106 (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[122] Dang, Q. (2007b, July 18). Recommendation for using approved hash algorithms (draft)
(NIST Special Publication 800-107 (Draft)). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[123] Davies, J. H. E. (1997, March 4). Personal identification devices and access control systems.
USPTO Issued Patent US5608387, Filing Date: 26 May 1994, Issue Date: 4 March 1997.
[124] de Angeli, A., Coventry, L., Johnson, G., and Renaud, K. (2005, July). Is a picture really
worth a thousand words? Exploring the feasibility of graphical authentication systems.
International. Journal of Human- Computer Studies, 63(1-2), 128-152.
[125] de Koning Gans, G., Hoepman, J.-H., and Garcia F. D. (2008, September 8-11). A practical
attack on the MIFARE Classic. Proceedings of the 8th IFIP WG 8.8/11.2 International
Conference on Smart Card Research and Advanced Applications (CARD IS 2008), London,
England, UK, 267-282.
[126] de Winter, B. (2008, October 7). Researchers show how to crack popular smart cards.
InfoWorld, [Online]. Available:
http://www.infoworld.com/article/08/10/07/Researchers_show_how_to_crack_popular_smart
_cards_l.html [2008, October 16].
[127] Deitel, H. M., Deitel, P. J., and Nieto, T. R. (2000). Internet and world wide web: How to
program. Upper Saddle River, New Jersey, USA: Prentice Hall.
[128] Deitel, H. M., Deitel, P. J., and Nieto, T. R. (2001). e-Business & e-commerce: How to
program. Upper Saddle River, New Jersey, USA: Prentice Hall.
[129] Dent, A. W., and Mitchell, C. J. (2004, October 31). User's guide to cryptography and
standards. Norwood, MA, USA: Artech House, Inc.
274
[130] desJardins, M. (1994, December). How to succeed in graduate school: A guide for students
and advisors (Part I of II). ACM Crossroads [Online], 7(2). Available:
http://www.acm.org/crossroads/xrdsl-2/advicel.html [2008, July 23].
[131] desJardins, M. (1995, February). How to succeed in graduate school: A guide for students
and advisors (Part II of II). ACM Crossroads [Online], 7(3). Available:
http://www.acm.org/crossroads/xrdsl-3/advice2.html [2008, July 23].
[132] Desmedt, Y. (1987, August 16-20). Society and group oriented cryptography: A new concept.
Proceedings of the Conference on the Theory and Applications of Cryptographic Techniques
1987 (aka Proceedings of the Advances in Crypto logy - CRYPTO ( 87) (aka Proceedings of
the 7th Annual International Crypto logy Conference on Advances in Cryptology 1987),
LNCS 293, Santa Barbara, CA, USA, 120-127.
[133] Desmedt, Y., and Frankel, Y. (1989, August 20-24). Threshold cryptosy stems. Proceeding of
the 9th Annual International Cryptology Conference on Advances in Cryptology 1989
(CRYPTO '89), LNCS 435, 307-315.
[134] DeVaney, D. B., Harper, D. J., and Short, T. D. (1987, October 6). Mobile telephone
switching office. USPTO Issued Patent US4698839, Filing Date: 3 June 1986, Issue Date: 6
October 1987.
[135] Devenport, M. (2005, April). Inventorship vs authorship: Who has the "write " to patent?,
[Online]. The Johns Hopkins University School of Medicine, Licensing and Technology
Development. Available: http://www.hopkinsmedicine.org/webnotes/licensing/0504.cfm
[2008, July 18].
[136] Dharmarajan, M. R. (2005, June 16). Method and apparatus for password generation.
USPTO Published Patent Application US2005/0 132203, Filing Date: 12 December 2003.
[137] Diffie, W., and Hellman, M. E. (1976, November). New directions in cryptography. IEEE
Transaction on Information Theory, IT-22(6), 644-654.
[138] Diffie, W., and Woods, W. A. (2006, June 22). Method for generating mnemonic random
passcodes. USPTO Published Patent Application US2007/0300076, Filing Date: 22 June
2006.
275
[139] Doggett, J., Jaffe, F. A., and Anderson, M. M. (1997, October 14). Electronic funds transfer
instruments. USPTO Issued Patent US5677955, Filing Date: 7 April 1995, Issue Date: 14
October 1997.
[140] Domenicone, R. (2000, May 3). Safety box assembly, EPO Published Patent Application
EP0703341, Filing Date: 25 September 1995.
[141] Donner, I. H. (1999, December 7). Intellectual property audit system. USPTO Issued Patent
US5999907, Filing Date: 6 December 1993, Issue Date: 7 December 1999.
[142] Donner, I. H. (2001, July 17). Method of performing intellectual property (IP) audit
optionally over network architecture. USPTO Issued Patent US 62633 14, Filing Date: 3
March 2000, Issue Date: 17 July 2001.
[143] Doumont, J.-L. (2002, June). Magical numbers: the seven-plus-or-minus-two myth. IEEE
Transactions on Professional Communication, 45(2), 123-127.
[144] Dray, J. R, Giles, A., Kelley, M., and Chandramouli, R. (2006, September). PIV card to
reader interoperability guidelines (NIST Special Publication 800-96). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[145] Duane, M. J. (2008, Spring). Lending a hand: The need for public participation in patent
examination and beyond. Chicago-Kent Journal of Intellectual Property, 7(2), 57-74.
[146] Dudas, J. W. (2007, August 21). Changes to practice for continued examination filings,
patent applications containing patentably indistinct claims, and examination of claims in
patent applications (final rule), [Online]. US Federal Register Part II (37 CFR Part 1),
72(161), 46715-46843. Department of Commerce, US: Patent and Trademark Office.
Available: http://www.ipfrontline.com/depts/article.asp ?id=15810&deptid=8;
http://www.ipfrontline.com/downloads/ContinuationRulesFinal.pdf [2007, August 22].
[147] Duren, M., and Hosmer, C. (2002, August 6-9). Can digital evidence endure the test of time?.
Proceedings of the 2002 Digital Forensic s Research Workshop (DFRWS 2002 j, [Online],
Syracuse, New York, USA. Available: http://www.dfrws.org/2002/program.shtml [2007,
May 20].
[148] Eastlake, D. 3rd, Crocker, S., and Schiller, J. (1994, December). Request for comments
(1750): Randomness recommendations for security (RFC 1750). Sterling, Virginia, USA:
Network Working Group, The Internet Engineering Task Force (IETF).
276
[149] Eastlake, D. 3rd, and Hansen, T. (2006, July). Request for comments (4634): US Secure Hash
Algorithms (SHA and HMAC-SHA) (RFC 4634). Sterling, Virginia, USA: Network Working
Group, The Internet Engineering Task Force (IETF).
[150] Eastlake, D. 3rd, and Jones, P. (2001, September). Request for comments (3174): US Secure
Hash Algorithm 1 (SHA1) (RFC 3174). Sterling, Virginia, USA: Network Working Group,
The Internet Engineering Task Force (IETF).
[151] Ebert, L. B. (2004, Fall). Patent grant rates at the United States Patent and Trademark Office.
Chicago-Kent Journal of Intellectual Property, 4(1), 108-116.
[152] Ebert, L. B. (2005, Spring). Comment on "Patent grant rates at the United States Patent and
Trademark Office". Chicago-Kent Journal of Intellectual Property, 4(2), 186-195.
[153] Ebert, L. B. (2007, August 8). Patent grant rate lower than many academics think, [Online].
IPFrontline Magazine of Intellectual Property and Technology, PatentCafe.com. Available:
http://www.ipfrontline.com/depts/article.asp ?id=15684&deptid=4 [2007, August 16].
[154] Editors of Time-Life Books (Eds.)- (2004a). Mind over matter. London, England, UK:
Caxton Publishing Group.
[155] Editors of Time-Life Books (Eds.)- (2004b). The psychics. London, England, UK: Caxton
Publishing Group.
[156] Eggers, J. J., Su, J. K., and Girod, B. (2000). Asymmetric watermarking schemes, [Online].
Available: http://citeseer.ist.psu.edu/eggersOOasymmetric.html [2008, July 17].
[157] Elliott, D. R. (2007, September 11). Method for obtaining and allocating investment income
based on the capitalization of intellectual property. USPTO Issued Patent US7269566, Filing
Date: 20 August 2002, Issue Date: 11 September 2007.
[158] Ellis, N. C., and Hennelly, R. A. (1980). A bilingual word-length effect: Implications for
intelligence testing and the relative ease of mental calculation in Welsh and English. British
Journal of Psychology, 71, 43-51.
[159] Ellison, C, and Schneier, B. (2000). Ten risks of PKI: What you're not being told about
public key infrastructure. Computer Security Journal, 7(5(1), 1-8.
277
[160] Elphinstone, L., and Schweitzer, R. (1998). How to get a research degree: A survival guide.
St. Leonards, New South Wales, Australia: Allen & Unwin.
[161] Farnell. (2007). The Farnell inOne catalogue 2007/2008, [Book, Online]. Available:
http://my.farnell.com [2008, January 24].
[162] Feistel, H. (1974a, March 19). Block cipher cryptographic system. USPTO Issued Patent
US3798359, Filing Date: 30 June 1971, Issue Date: 19 March 1974.
[163] Feistel, H. (1974b, March 19). Centralized verification system. USPTO Issued Patent
US3798360, Filing Date: 30 June 1971, Issue Date: 19 March 1974.
[164] Feistel, H. (1974c, March 19). Step code ciphering system. USPTO Issued Patent US3798605,
Filing Date: 30 June 1971, Issue Date: 19 March 1974.
[165] Ferguson, N., Schneier, B. (2003). Practical cryptography. Indianapolis, Indiana, USA:
Wiley Publishing, Inc.
[166] Fialka, J. J. (1999, March 1). War by other means: Economic espionage in America. New
York, NY, USA: W. W. Norton & Company (URL: http://www.wwnorton.com).
[167] Finegan, E. (2004). Language: Its structure and use (4th ed.). Boston, MA: Thomson
Wardsworth.
[168] Fink, S. (2002, January 15). Sticky fingers: Managing the global risk of economic espionage
(hardcover). New York, NY, USA: Dearborn Trade Publishing (now called as Kaplan
Publishing) (URL: http://www.dearborntrade.com) (URL: http://www.kaplanpublishing.com).
[169] Fink, S. (2003, December 9). Sticky fingers: Managing the global risk of economic espionage
(paperback). Bloomington, IN, USA: iUniverse.com, a self-publishing company.
[170] Fischer, M., and Lynch, N. (1982, June 13). A lower bound for the time to assure interactive
consistency. Information Processing Letters, 14(4), 183-186.
[171] Fitzi, M., and Hirt, M. (2006, July 23-26). Optimally efficient multi-valued Byzantine
agreement. Proceedings of the 2^th Annual ACM Symposium on Principles of Distributed
Computing 2006 (PODC 2006), Denver, Colorado, USA, 163-168.
278
[172] Florencio, D., and Herley, C. (2007, May 8-12). A large-scale study of web password habits.
Proceedings of the 16th ACM International Conference on World Wide Web, Banff, Alberta,
Canada, 657-666.
[173] Fonseca, D. E. (2003, December 9). Data line switch. USPTO Issued Patent US6660950,
Filing Date: 24 July 2001, Issue Date: 9 December 2003.
[174] Ford, W. (1994). Computer communications security: Principles, standard protocols and
techniques. Englewood Cliffs, NJ, USA: Prentice Hall.
[175] Ford, W., and Baum, M. S. (2001). Secure electronic commerce: Building the infrastructure
for digital signatures and encryption (2nd ed.)- Upper Saddle River, New Jersey, USA:
Prentice Hall.
[176] Fossum, V. (No date). Entropy, compression, and information content, [Online]. Available:
http://www.eecs.umich.edu/~vfossum/pubs/entropy_explanation.pdf;
http://www.cs.iupui.edu/~xkzou/teaching/csci590/entropy_explanation.pdf [2008, July 23].
[177] Frankel, S., Eydt, B., Owens, L., and Scarf one, K. (2007, February). Establishing wireless
robust security networks: A guide to IEEE 802.1 li (NIST Special Publication 800-97).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[178] Frankel, S., Hoffman, P., Orebaugh, A., and Park, R. (2007, August). Guide to SSL VPNs
(draft) (NIST Special Publication 800-113 (Draft)). Gaithersburg, MD, USA: CSRC
(Computer Security Resource Center), NIST.
[179] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and
Stewart, L. (1999, June). Request for comments (2617): HTTP authentication: Basic and
digest access authentication (RFC 2617). Sterling, Virginia, USA: Network Working Group,
The Internet Engineering Task Force (IETF).
[180] Fridrich, J., and Goljan, M. (2004, December 14). Reliable detection of LSB steganography
in color and grayscale images. USPTO Issued Patent US6831991, Filing Date: 22 June 2001,
Issued Date: 14 December 2004.
[181] Fridrich, J., Goljan, M., and Soukal, D. (2004, January 18-22). Searching for the stego-key.
Proceedings of the SPIE on Security, Steganography, and Watermarking of Multimedia
Contents VI, San Jose, California, USA, 70-82.
279
[182] Fried, L, and Evers, J. (2006, February 14). Gates: End to passwords in sight, [Online].
CNET Networks, Inc. Available: http://news.cnet.com/Gates-End-to-passwords-in-
sight/2100-7355_3-6039177.html?tag=nw. 1 1 [2008, August 23].
[183] Fumy, W., and Landrock, P. (1993, June). Principles of key management. IEEE Journal on
Selected Areas in Communications, 77(5), 785-793.
[184] Furht, B., and Kirovski, D. (2006a, April 18). Multimedia watermarking techniques and
applications. Boca Raton, FL, USA: Taylor & Francis Group, Auerbach Publications.
[185] Furht, B., and Kirovski, D. (2006b, May 3). Multimedia encryption and authentication
techniques and applications. Boca Raton, FL, US A: Taylor & Francis Group, Auerbach
Publications.
[186] Furnell, S. (2005, March). Authenticating ourselves: will we ever escape the password?
Network Security, 2005(3), 8-13.
[187] Furon, T., and Duhamel, P. (2003, April). An asymmetric watermarking method. IEEE
Transactions on Signal Processing, 57(4), 981-995.
[188] Furon, T. (2005, September 15-17). A survey of watermarking security. Proceedings of the
4th International Workshop on Digital Watermarking 2005 (IWDW 2005), LNCS 3710,
Siena, Tuscany, Italy, 201-215.
[189] Gabber, E., Gibbons, P. B., Matias, Y., and Mayer, A. (1997, February 24-28). How to make
personalized web browsing simple, secure, and anonymous. Proceedings of 1st International
Conference on Financial Cryptography 1997 (FC 1997), LNCS 1318, Anguilla, British West
Indies, 17-31.
[190] Ganesan, R. (1996a, July 9). Yaksha, an improved system and method for securing
communications using split private key asymmetric cryptography. USPTO Issued Patent
US5535276, Filing Date: 9 November 1994, Issue Date: 9 July 1996.
[191] Ganesan, R. (1996b, September 17). System and method for centralized session key
distribution, privacy enhanced messaging and information distribution using a split private
key public cryptosystem. USPTO Issued Patent US5557678, Filing Date: 18 July 1994, Issue
Date: 17 September 1996.
280
[192] Ganesan, R. (1998a, April /). Computer system for securing communications using split
private key asymmetric cryptography. USPTO Issued Patent US5737419, Filing Date: 7 June
1996, Issue Date: 7 April 1998).
[193] Ganesan, R. (1998b, May 5). Securing E-mail communications and encrypted file storage
using yaksha split private key asymmetric cryptography. USPTO Issued Patent US5748735,
Filing Date: 7 June 1996, Issue Date: 5 May 1998.
[194] Ganesan, R. (1998c, November 17). Computer system for centralized session key distribution,
privacy enhanced messaging and information distribution using a split private key public
cryptosystem. USPTO Issued Patent US5838792, Filing Date: 8 August 1996, Issue Date: 17
November 1998.
[195] Ganesan, R. (1999, May 18). Programmed computer for identity verification, forming joint
signatures and session key agreement in an RSA public cryptosystem. USPTO Issued Patent
US5905799, Filing Date: 15 October 1996, Issue Date: 18 May 1999.
[196] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006a, May 31). Augmented
single factor split key asymmetric cryptography-key generation and distributor. USPTO
Published Patent Application US2007/0033392, Filing Date: 31 May 2006.
[197] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006b, May 31). Secure login
using augmented single factor split key asymmetric cryptography. USPTO Published Patent
Application US2007/0 186095, Filing Date: 31 May 2006.
[198] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006c, May 31). Secure login
using single factor split key asymmetric cryptography and an augmenting factor. USPTO
Published Patent Application US2007/0033393, Filing Date: 31 May 2006.
[199] Ganesan, R., Sandhu, R. S., Cottrell, A. P., Schoppert, B. J., and Bellare, M. (2006, May 2).
Protecting one-time-passwords against man- in-the- middle attacks. USPTO Published Patent
Application, US2007/0033642, Filing Date: 2 May 2006.
[200] Ganesan, R., and Yacobi, Y. (1996, December 24). System and method for identity
verification, forming joint signatures and session key agreement in an RSA public
cryptosystem. USPTO Issued Patent US5588061, Filing Date: 20 July 1994, Issue Date: 24
December 1996.
281
[201] Garcia, F. D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R. W.,
and Jacobs, B. (2008, October 6-8). Dismantling MIFARE Classic. Proceedings of the 13th
European Symposium on Research in Computer Security (ESORICS 2008), Malaga,
Andalusia, Spain, 97-114.
[202] Gardiner, D. (2008). Phishing ativity tends rport Ql/2008, [Online]. APWG (Anti-Phishing
Working Group). Available: http://www.antiphishing.org/reports/apwg_report_Ql_2008.pdf
[2008, September 19].
[203] Gehringer, E. F. (2002, June 6-8). Choosing passwords: Security and human factors.
Proceedings of the IEEE International Symposium on Technology and Society (1ST AS 2002),
Raleigh, North Carolina, USA, 369-373.
[204] Gehrmann, C, and Naslund, M. (Eds.). (2005, March 1). ECRYPT Yearly report on
algorithms and keysizes (2004) (Report No. IST-2002-507932 D.SPA.10). Katholieke
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in
Cryptology (ECRYPT).
[205] Gehrmann, C, and Naslund, M. (Eds.). (2006, January 29). ECRYPT Yearly report on
algorithms and keysizes (2005) (Report No. IST-2002-507932 D.SPA.21). Katholieke
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in
Cryptology (ECRYPT).
[206] Gehrmann, C., and Naslund, M. (Eds.). (2007, January 26). ECRYPT Yearly report on
algorithms and keysizes (2006) (Report No. IST-2002-507932 D.SPA.16). Katholieke
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in
Cryptology (ECRYPT).
[207] Gennaro, R. (2005, April). An improved pseudo-random generator based on the discrete
logarithm problem. Journal of Cryptology, 18(2), 91-110.
[208] Glick, L. (1995). Criminology. Needham Heights, MA, USA: Allyn & Bacon.
[209] Gladden, C. A., and Parelman, M. H. (1979, May 1). Rapidly deploy able emergency
communication system. USPTO Issued Patent US4 152647, Filing Date: 23 February 1978,
Issue Date: 1 May 1979.
282
[210] Goal, P. M., and Kriese, S. J. (2004, August 26). Method and system for automated password
generation. USPTO Published Patent Application US2004/0168068, Filing Date: 20
February 2003.
[211] Goldstein, H. (2006, November). Patent power. IEEE Spectrum, 43(11), 44-47.
[212] Goldwasser, S. (1997, October 20-22). New directions in cryptography: twenty some years
later (or cryptograpy and complexity theory: a match made in heaven). Proceedings of the
38th Annual Symposium on Foundations of Computer Science (SFCS 1997), Miami Beach,
Fl, USA, 314-324.
[213] Good practices in the protection of witnesses in criminal proceedings involving organized
crime, [Online]. (2008). UNODC (United Nations Office on Drugs and Crime). Available:
http://www.unodc.org/documents/organized-crimeAVitness-protection-manual-Feb08.pdf
[2008, July 21].
[214] Gordon, R. G. Jr. (Ed.)- (2005, January 1). Ethnologue: Languages of the world (15th ed.),
[Online]. Dallas, Texas, USA: SIL International. Available:
http://www.ethnologue.com/web.asp [2008, September 15].
[215] Gouda, M. G., Liu, A. X., Leung, L. M., and Alam, M. A. (2005, June 7-10). Single
password, multiple accounts. Proceedings of the 3rd International Conference on Applied
Cryptography and Network Security (ACNS 2005), LNCS 3531, New York City, NY, USA,
Industry I Short Paper Track, 1-12.
[216] Graefe, J. M., Lashley, L., Guimaraes, M. A. M., Guodabia, E., Gupta, A. K., Henry, H., and
Austin, R. (2007, September 28-29). Credit card transaction security. ACM Proceedings of
the 4th Annual Conference on Information Security Curriculum Development 2007,
Kennesaw, Georgia, USA, 118-123.
[217] Haber, S., and Stornetta, W. S. (1990, August 11-15). How to time- stamp a digital document.
Proceedings of the 10th Annual International Cryptology Conference on Advances in
Cryptology 1990 (CRYPTO LNCS 537, Santa Barbara, CA, USA, 437-455.
[218] Haber, S., and Stornetta, W. S. (1991, January). How to time- stamp a digital document.
Journal of Cryptology, 3(2), 99-111.
[219] Hachez, G., and Quisquater, J.-J. (2002). Which directions for asymmetric watermarking?,
[Online]. Available: http://citeseer.ist.psu.edu/564734.html [2008, July 17].
283
[220] Halderman, J. A., Waters, B., and Felten, E. W. (2005, May 10-14). A convenient method for
securely managing passwords. Proceedings of the 14th International Conference on World
Wide Web 2005, Chiba, Japan, 471-479.
[221] Hanker son, D., Menezes, A., and Van stone, S. (2004). Guide to elliptic curve cryptography.
New York, NY, USA: Springer- Verlag New York, Inc.
[222] Hanker son, D., Menezes, A., and Van stone, S. (2005, August). Guide to elliptic curve
cryptography [摘 圆曲线 密码学 导论] (张焕 国, Trans, to Chinese language). Beijing [北京],
China [中国]: Publishing House of Electronics Industry [电 子ェ业 出版社]. (Original
published in 2004 in English language).
[223] Haperen, P. V. (1997, May 16). Graphical password entry. UK Published Patent Application
GB23 13460, Filing Date: 16 May 1997.
[224] Hardesty, E. C. (1975, January 14). Electrical connecting devices for terminating cords and
methods of assembling the devices to cords. USPTO Issued Patent US 3 8603 16, Filing Date:
6 July 1973, Issue Date: 14 January 1975.
[225] Harn, L., and Kresler, T. (1989, July 20). New scheme for digital multisignatures.
Electronics Letters, 25(15), 1002-1003.
[226] Hart, G. W. (1994, September). To decode short cryptograms. Communications of the ACM,
37(9), 102-108.
[227] Hartung, R, and Kutter, M. (1999, July). Multimedia watermarking techniques. Proceedings
of the IEEE, 87(1), 1079-1107.
[228] Haskin, J. (2008, January 11). Busting the 10 myths about data protection, [Online].
CIO.com. Available: http://www.cio.com/article/print/171551 [2008, September 10].
[229] Hayes, J. (2001). Fiber optics technician's manual (2nd ed.). Albany, NY, USA: Thomson
Learning, Inc., Delmar.
[230] Haykin, S. (1999). Neural networks: A comprehensive foundation (2nd ed.). Upper Saddle
River, NJ, USA: Prentice Hall.
284
[231] Haylock, S. E. (No date). Fingerprints, [Online]. Answers.com. Available:
http://www.answers.com/topic/fingerprints-5 [2008, September 1].
[232] He, J. H. [何 家弘] (Ed.). (2007, August). 新编 犯罪 侦查学 [New criminal investigation
study]. Beijing [北京], China [中国]: Publishing House of China's Legal System [中国 法制
出版社], (in Chinese language).
[233] Herrmann, D. S. (2007, January 22). Complete guide to security and privacy metrics:
Measuring regulatory compliance, operational resilience, and ROI. Boca Raton, Florida,
USA: Auerbach Publications, Taylor & Francis Group.
[234] Hilley, S. (2006, October). Internet war: Picking on the finance sector - Survey More
vulnerabilities & phishing. Computer Fraud & Security, 2006(10), 2.
[235] Hirsch, J. E. (2005, November 15). An index to quantify an individual's scientific research
output. PNAS (Proceedings of the National Academy of Sciences), ᅵ /ひ 2(46), 16569-165 /z.
[236] Hoffman, N. E. (1982, June 1). DIP swtich. USPTO Issued Patent US4332987, Filing Date:
15 December 1980, Issue Date: 1 June 1982.
[237] Hoosain, R., and Salili, F. (1988). Language differences, working memory, and mathematical
ability. Practical aspects of memory: Current research and issues, 2, 512-517.
[238] Huang, T. D. (1985, February 19). Method for encoding Chinese characters. USPTO Issued
Patent US4500872, Filing Date: 18 March 1982, Issue Date: 19 February 1985.
[239] Huang, X. R. [黄秀 如]. (2002). 词典 的两个 世界 [A history of dictionaries]. Taipei,
Taiwan (ROC): Net and Books [网路 与书] . (in Chinese language).
[240] Hunter, P. (2006, May). Microsoft declares war on phishers. Computer Fraud & Security,
2006(5), 15-16.
[241] Identity Theft Resource Center (ITRC), [Online]. (No date). Available:
http://www.idtheftcenter.org [2008, October 23].
[242] IEEE Communications Society. (2002). A brief history of communications. Piscataway, NJ:
IEEE Communications Society.
285
[243] IEEE Publications. (2002, February 15 - 2008, June 20). IEEE Publication Services and
Products Board (PSPB) Operations Manual, [Online]. IEEE Publications, Piscataway, NJ,
USA. Available:
http://wwwieee.org/portaycms_docs_iportals/iportals/publications/PSPB/opsmanual.pdf
[2008, July 18].
[244] Identity-related crime. (2007, November 29-30). In UNODC and organized crime, [Online].
UNODC (United Nations Office on Drugs and Crime). Available:
http://www.unodc.org/unodc/en/organized-crime/index.html [2008, July 21].
[245] IIPA. (2001). Rock Records (M) Sdn. Bhd. v. Audio One Entertainment Sdn. Bhd. [2005] 1
CLJ 200. In Special report 301 Malaysia, [Online]. International Intellectual Property
Alliance (IIPA). Available: http://www.iipa.com/rbc/2001/2001SPEC301MALAYSIA.pdf
[2007, May 20].
[246] ILBS. (2003, March 20). Laws of Malaysia: Evidence Act 1950 (Act 56). Petaling Jaya,
Selangor, Malaysia: International Law Book Services (ILBS).
[247] International Dunhuang Project (IDP) [國際 敦煌 項目]. (No date). The International
Dunhuang Project: The Silk Road online, [Online]. Available: http://idp.bl.uk (British
Library); http://idp.nlc.gov.cn (National Library of China) [2008, July 16].
[248] Inventors Assistance League. (No date). First to invent vs. first to file, [Online]. Available:
http://www.inventions.org/resources/advisory/first.html [2007, October 22].
[249] Inventorship vs. authorship, [Online]. (2008). Albert Einstein College of Medicine of
Yeshiva University, Offices of Biotechnology and Business Development. Available:
http://www.aecom.yu.edu/biotechnology/page.aspx ?id=3316 [2008, July 18].
[250] Ismail, S. (2001). Time -stamping for Malaysia, [Online]. CiteSeer. Available:
http://citeseer.ist.psu.edu/ismail01timestamping.html [2007, January 8].
[251] Itakura, K., and Nakamura, K. (1983, October). A public key cryptosystem suitable for
digital multisignatures. NEC Journal on Research & Development, 77, 1-8.
[252] Ives, B., Walsh, K. R., Schneider, H. (2004, April). The domino effect of password reuse.
Communications of the ACM , 47(4), 73-/8.
286
[253] Jablon, D. P. (2006, March 7). Cryptographic methods for remote authentication. USPTO
Issued Patent US7010692, Filing Date: 9 June 2004, Issue Date: 7 March 2006.
[254] Jacobs, A. (1998). Dictionary of music (6th ed.). England, United Kingdom: Penguin Books.
[255] Jacobs, R. A. (1988). Increased rates of convergence through learning rate adaption. Neural
Networks, 7(4), 295-307.
[256] Jan sen, W., Gavrila, S., Korolev, V., Ayers, R., and Swanstrom, R. (2003, July). Picture
password: A visual login technique for mobile devices (NIST IR 7030). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[257] Jermyn, I., Mayer, A., Monrose, F., Reiter, M., and Rubin, A. (1999, August 23-26). The
design and analysis of graphical passwords. Proceedings of 8th USENIX Security Symposium.
Washington D.C., USA, 1-14.
[258] Jones, D. M. (2002, October). The 7±2 urban legend, [Online]. MISRA C Conference.
Available: http://citeseer.ist.psu.edu/jones02urban.html;
http://www.knosof.co.uk/cbook/misart.pdf [2008, July 20].
[259] Jones, M. B. (2005, May). Microsoft's vision for an identity metasystem, [Online]. Microsoft
Corporation. Available: http://msdn.microsoft.com/en-us/lihrary/ms996422.aspx [2008,
August 25].
[260] Kahn, D. (1996a, May 30 - June 1). The history of steganography. Proceedings of the 1st
International Workshop on Information Hiding (IH '96), LNCS 1174, Cambridge,
Cambridgeshire, UK, 1-5.
[261] Kahn, D. (1996b, December 5). The code -breakers: The comprehensive history of secret
communication from ancient times to the Internet (Revised and updated ed.)- New York City,
NY, USA: Scribner, 93-105, 125.
[262] Kanaley, R. (2001, February 4). Login error trouble keeping track of all your sign-ons?
Here へ a place to keep your electronic keys, but you'd better remember the password. San
Jose Mercury News.
[263] Kang, M. M., Park, W. W., and Koo, J. R. (2003, June 28 - July 6). Agent for electronic
commerce on the semantic web. Proceedings of the 7th Korea-Russia International
287
Symposium on Science and Technology 2003 (KORUS 2003 J, Ulsan, Republic of Korea,
2003, Vol. 2, 360-363.
[264] Karp, A. H. (2003, May 6). Site-specific passwords (Tech. Rep. No. HPL-2002-39R1). Palo
Alto, CA, USA: Hewlett-Packard Company, HP Laboratories Palo Alto, Intelligent
Enterprise Technologies Laboratory.
[265] Karp, A. H., and Poe, D. T. (2002, August 2). System-specific passwords. USPTO Published
Patent Application US 2004/0025 026, Filing Date: 2 August 2002.
[266] Karygiannis, T., Eydt, B., Barber, G., Bunn, L., and Phillips, T. (2007, April). Guidelines for
securing radio frequency identification (RFID) systems (NIST Special Publication 800-98).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[267] Karygiannis, T., and Owens, L. (2002, November). Wireless network security: 802.1 1,
Bluetooth and handheld devices (NIST Special Publication 800-48). Gaithersburg, MD, USA:
CSRC (Computer Security Resource Center), NIST.
[268] Kaufman, C, Perlman, R., and Speciner, M. (1995). Network security: Private
communication in a public world. Upper Saddle River, New Jersey, USA: Prentice Hall, 39-
100.
[269] Keller, S. S. (2005, January 31). NIST- recommended random number generator based on
ANSI X9.31 Appendix A.2.4 using the 3 -key triple DES and AES algorithms, [Online].
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. Available:
http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf [2008, May 19].
[270] Kelsey, J., Schneier, B., Hall, C., and Wagner, D. (1997, September 17-19). Secure
applications of low- entropy keys. Proceedings of the International Workshop on Information
Security (ISW '97j, LNCS 1396, Tats 皿 okuchi, Ishikawa, Japan, 121-134.
[271] Khatri, N., and Tsang, E. W. K. (2003, April). Antecedents and consequences of cronyism in
organizations. Journal of Business Ethics, 43(4), 289-303.
[272] Khaw, L. T. (2001). Copyright law in Malaysia (2nd ed.). Kuala Lumpur, Malaysia: Malayan
Law Journal.
288
[273] Kini, A., and Choobineh, J. (1998, January 6-9). Trust in electronic commerce: Definition
and theoretical considerations. Proceedings of the 31st Hawaii International Conference on
System Sciences 1998 (HICSS 1998), Kohala Coast, HI, USA, Vol. 4, 51-61.
[274] Kissel, R. (Ed.). (2006, April 25). Glossary of key information security terms (NIST IR 7298).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[275] Klein, D. V. (1990, August 27). "Foiling the cracker": A survey of, and improvements to,
password security (revised paper). Proceedings of the USENIX 2nd Security Workshop
Program, Portland, Oregon, USA, 5-14.
[276] Klimek, P., Hanel, R., and Thurner, S. (2008, April 14). To how many politicians should
government be left?, [Online]. Cornell University Library, Ithaca, NY, USA. Available:
http://arxiv.org/pdf/0804.2202 [2008, July 18].
[277] Koblitz, N. (1994, September 2). A course in number theory and cryptography (2nd ed.)-
New York, NY, USA: Springer- Verlag New York, Inc.
[278] Komyunitipatentorebyu [コミ ュニテ イノ、 ァ ン 卜 レビュー] - Community patent review,
[Online]. (No date). JPO (Japan Patent Office). Available: http://www.cprtrial-iip.org [2008,
August 21].
[279] Konrad, K., Fuchs, G., and Barthel, J. (1999, October 19-22). Trust and electronic commerce
- More than a technical problem. Proceedings of the 18th IEEE Symposium on Reliable
Distributed Systems 1999 (RELDIS 1999), Lausanne, Switzerland, 360-365.
[280] Kotadia, M. (2004, February 25). Gates predicts death of the password, [Online]. CNET
Networks, Inc. Available: http://news.cnet.com/Gates-predicts-death-of-the-password/2100-
1029_3-5 164733.html?tag=nw.4 [2008, August 23].
[281] Kormann, D. P., and Rubin, A. D. (2000, June). Risks of the Passport single signon protocol.
Computer Networks, 33{\-6), 51-58.
[282] Kucera, H., and Francis, W. N. (1967). Computational analysis of present-day American
English. Providence, Rhode Island, USA: Brown University Press.
[283] Kuhn, D. R., Hu, V. C, Polk, W. T., and Chang, S.-J. (2001, February 26). Introduction to
public key technology and the federal PKI infrastructure (NIST Special Publication 800-32).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
289
[284] Kurokawa, K. (1988, July). Quality and innovation [Japanese electronics industry]. IEEE
Circuits and Devices Magazine, 4(4), 3-8.
[285] Kurokawa, K. (1990, May 13-18). Quality and innovation. Proceedings of the 1990 IEEE
International Conference on Robotics and Automation (ROBOT 1990), Cincinnati, OH, USA,
Vol. 3, 2180-2184.
[286] Kurokawa, K. (1991, January). Quality and innovation. IEEE Control Systems Magazine,
77(1), 47-51.
[287] Kurokawa, K. (1997, April/May). Modeling human interactions. IEEE Potentials, 16(2), Part
2, 26-28.
[288] Kurzban, S. A. (1985, Fall/Winter). Easily remembered passphrases - A better approach.
ACM SIGSAC Review, 3(2-4), (SIGSAC: Special Interest Group on Security, Audit and
Control), 10-21.
[289] Lampe, K. (Ed.)- (No date). Definitions of organized crime, [Online]. Available:
http://www.organized-crime.de/OCDEFl.htm [2008, July 21].
[290] Lamport, L. (1983, July). The weak Byzantine Generals Problem. Journal of the ACM, 30(3),
668-676.
[291] Lamport, L., Shostak, R., and Pease, M. (1982, July). The Byzantine Generals Problem. ACM
Transactions on Programming Languages and Systems, 4(3), 382-401.
[292] LAN/MAN Standards Committee. (2005, December 9). Part 3: Carrier sense multiple
access with collision detection (CSMA/CD) access method and physical layer specifications,
[Online]. New York, NY, USA: IEEE Computer Society. Available: Access
http://standards.ieee.Org/getieee802/802.3.html (to get)
http://standards.ieee.org/getieee802/download/802.3-2005_section2.pdf [2008, January 24].
[293] Landy, D., McCue, K., and Aronson, E. (1969, June). Beyond Parkinson's law: III. The effect
of protractive and contractive distractions on the wasting of time on subsequent tasks.
Journal of Applied Psychology, 53(3), Part 1, 23o-z39.
[294] Lauer, H. C. (No date). Discussion on Ph.D. thesis proposals in computing science, [Online].
Available: http://homes.cerias.purdue.edu/~spaf/Archive/Lauer.html [2008, August 2].
290
[295] Layman, M. D., and Potter, G. W. (1997). Organized crime. Upper Saddle River, New Jersey,
USA: Prentice-Hall, Inc.
[296] Le, A. V., Matyas, S. M., Johnson, D. B., and Wilkins, J. D. (1993). A public key extension
to the common cryptographic architecture. IBM Systems Journal, 32(3), 461-485.
[297] Le Quere, P. (2004, March 30). High speed random number generation. USPTO Issued
Patent US67 14955, Filing Date: 13 August 2001, Issue Date: 30 March 2004.
[298] Lee, K. W. (2003, June 5). Artificial neural network based Byzantine Agreement Protocol.
Unpublished master's thesis, Multimedia University, Bukit Beruang, Melaka, Malaysia.
[299] Lee, K. W. (2005a, July 4-6). Semantic error occurrences in the multimedia communications.
Proceedings of IASTED 2005 International Conference on Education & Technology
(ICET2005), Calgary, Alberta, Canada, 227-231.
[300] Lee, K. W. (2005b, September 19). An nPST dual in-line package switch (DIUDIP switch)
Unking all the little actuators into a single actuator, [Electronic Component, Layout-Design
of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[301] Lee, K. W. (2006a, June 27-28). Byzantine agreement for electronic commerce. Proceedings
of the Regional Computer Science Postgraduate Conference 2006 (USM-ReCSPC06),
Penang, Malaysia, 114-119.
[302] Lee, K. W. (200ob, November 5). 2 -dimensional key input method version 1.1, [CD-ROM,
Computer Program]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[303] Lee, K. W. (2006c, November 29). An Ethernet cable RJ45 switch for securing data
communication and storage using conventional dual in-line package switch (DIL/DIP
switch ), [Electronic Component, Layout-Design of Integrated Circuit]. Available: Lee, K. W.,
Bukit Beruang, Melaka, Malaysia.
[304] Lee, K. W. (2007a, January). Account amount estimator of multihash key using key
strengthening based on time response, [CD-ROM, Computer Program]. Available: Lee, K.
W., Bukit Beruang, Melaka, Malaysia.
[305] Lee, K. W. (2007b, October 19). An (nPST + reverse mPST) dual in-line package switch
(DIL/DIP switch ) with two bigger actuators linking two groups of switches activated
291
oppositely, [Electronic Component, Layout-Design of Integrated Circuit]. Available: Lee, K.
W., Bukit Beruang, Melaka, Malaysia.
[306] Lee, K. W. (2007c, December 11). An Ethernet cable RJ45 switch for securing data
communication and storage using Gray hill 78H02T (double 4PST DIP switch ), [Electronic
Component, Layout-Design of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang,
Melaka, Malaysia.
[307] Lee, K. W. (2007d, December 11). An Ethernet cable RJ45 switch for securing data
communication and storage using Gray hill 78H01T (single 4PST DIP switch ), [Electronic
Component, Layout-Design of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang,
Melaka, Malaysia.
[308] Lee, K. W. (2007e, December 11). An Ethernet cable RJ45 switch for securing data
communication and storage using Gray hill 78F01T (single 2PST DIP switch ), [Electronic
Component, Layout-Design of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang,
Melaka, Malaysia.
[309] Lee, K. W. (2008a, May 8). An improved dual in-line (DIL) switch for securing data
communication and storage. Malaysia Patent Application PI 20070733, MylPO, Filing Date:
11 May 2007.
[310] Lee, K. W. (2008b, May 8). An improved dual in-line (DIL) switch for securing data
communication and storage. PCT Patent Application PCT/MY2008/000040, WIPO, Filing
Date: 8 May 2008.
[311] Lee, K. W. [李國 華]. (2008c, May 9). 應用於 保護 資料 通 訊 及存儲 安全 之 改良 式 雙行開
M [An improved dual in-line (DIL) switch for securing data communication and storage].
Taiwan (ROC) Patent Application TW097 117364, TIPO, Filing Date: 9 May 2008. (in
Chinese language).
[312] Lee, K. W. (2008d, June 2). A telephone cable RJ11 switch for securing data communication
and storage using Gray hill 78H01T (single 4PST DIP switch ), [Electronic Component,
Layout-Design of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka,
Malaysia.
[313] Lee, K. W. (2008e, June 2). A telephone cable RJ11 switch for securing data communication
and storage using Gray hill 78F01T (single 2PST DIP switch j, [Electronic Component,
292
Layout-Design of Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka,
Malaysia.
[314] Lee, K. W. (2008f, June 2). A USB switch for securing data communication and storage
using Gray hill 78H01T (single 4PST DIP switch ), [Electronic Component, Layout-Design of
Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[315] Lee, K. W. (2008g, June 2). A USB switch for securing data communication and storage
using Gray hill 78F0 IT (single 2PST DIP switch), [Electronic Component, Layout-Design of
Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[316] Lee, K. W. (2008h, July 25). Methods and systems to create big memorizable secrets and
their applications in information engineering. Malaysia Patent Application PI 20082771,
MylPO, Filing Date: 25 July 2008.
[317] Lee, K. W. (2008i, September 21). 2 -dimensional key input method with multihash key
version 2.0, [CD-ROM, Computer Program]. Available: Lee, K. W., Bukit Beruang, Melaka,
Malaysia.
[318] Lee, K. W. (2008j, September 21). Mobile ECC version 2.0, [CD-ROM, Computer Program].
Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[319] Lee, K. W. (2008k, September 21). 2 -factor multimedia key with multihash key version 1.0,
[CD-ROM, Computer Program]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[320] Lee, K. W., and Ewe, H. T. (2001, October 2001). Artificial neural networks based algorithm
for Byzantine Generals Problem. Proceedings of the MMU International Symposium on
Information and Communications Technologies 2001 ( MMU -Ml U SIC 2001), Petaling Jaya,
Selangor, Malaysia, pp. TS 1.4(1-4).
[321] Lee, K. W., and Ewe, H. T. (2002, July 17-19). Artificial neural network based Byzantine
Agreement Protocol. Proceedings of the 6th IASTED International Conference on Artificial
Intelligence and Soft Computing (IASTED-ASC 2002 J, Banff, Alberta, Canada, 368-373.
[322] Lee, K. W., and Ewe, H. T. (2003, October 2-3). Faulty node detection in the tripartite ANN
based BAP. Proceedings of the MMU International Symposium on Information and
Communications Technologies 2003 (MMU-M2USIC 2003 ), Petaling Jaya, Selangor,
Malaysia, 45-48.
293
[323] Lee, K. W., and Ewe, H. T. (2006, November 3-6). Coinware for multilingual passphrase
generation and its application for Chinese language password. Proceedings of the 2006
International Conference on Computational Intelligence and Security (CIS 2006),
Guangzhou, Guangdong, China, 1511-1514 (Part 2).
[324] Lee, K. W., and Ewe, H. T. (2007a, August). Multiple hashes of single key with passcode for
multiple accounts. Journal ofZhejiang University Science A (JZUS-A), 8(8), 1183-1190.
[325] Lee, K. W., and Ewe, H. T. (2007b, November 1). Performance study of Byzantine
Agreement Protocol with artificial neural network. Information Sciences, 777(21), 4785-4798.
[326] Lee, K. W., and Ewe, H. T. (2007c, November 12-15). Speeding up the Byzantine
Agreement Protocol with artificial neural network (BAP-ANN) using modified
backpropagation learning algorithm (BPLA). Proceedings of the Malaysia-Japan
International Symposium on Advanced Technology 2007 (M J IS AT 2007), Kuala Lumpur,
Malaysia, pp. 65 & 169 [CD-ROM, Technical Session T5-5: AI Applications III].
[327] Lee, K. W., and Ewe, H. T. (2007d, December 15-19). Passphrase with semantic noises and a
proof on its higher information rate. Proceedings of the International Conference on
Computational Intelligence and Security Workshops (CISW 2007), Harbm, Heilon^jiang,
China, 652-655.
[328] Lee, K. W., Radhakrishna, G., and Khaw, L. T. (2007, November 19-20). The proof of
copyright ownership using digital timestamp in Malaysia. Proceedings of the MMU
International Symposium on Information and Communications Technologies 2007 (MMU-
M2USIC 2007), Petaling Jaya, Selangor, Malaysia, pp. 20 & 37, [CD-ROM, file (f.) TS3A-
l.pdf]. Multimedia University, Cyberjaya (Selangor) & Bukit Beruang (Melaka), Malaysia.
[329] Lee, K. W., and Tan, A. W. C. (2006a, November 19). Multilingual key input method version
1.0, [CD-ROM, Computer Program]. Available: Lee, K. W., Bukit Beruang, Melaka,
Malaysia.
[330] Lee, K. W., and Tan, A. W. C. (2006b, November 24). MobileECC version 1.2, [CD-ROM,
Computer Program]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia.
[331] Lee, K. W., Teh, C. E., and Tan, Y. L. (2006, May 30-31). Decrypting English text using
enhanced frequency analysis. Seminar conducted at the meeting of the National Seminar on
Science, Technology and Social Sciences (STSS 2006), Kuantan, Pahang, Malaysia.
294
[332] Lee, S.-C, Tang, D., Chen, C.-T., and Fang, S.-C. (2002, May). Finger-reading: Exploring
the information field. The International Journal of Healing and Caring, 2(2), 1-25.
[333] Lee, W. C. Y. (1995). Mobile cellular telecommunications: Analog and digital systems (2nd
ed.). Singapore: McGraw-Hill Book Company, 463-486.
[334] Lemley, M. A., and Moore, K. A. (2004). Ending abuse of patent continuations. Boston
University Law Review, 84, 63-118.
[335] Lemley, M. A., and Sampat, B. N. (2007, November 9-10). Is the patent office a rubber
stamp? Proceedings of the 2nd Annual Conference on Empirical Legal Studies (CELS 2007),
New York, NY, USA.
[336] Li, J.-R, Hu, G.-R, Wang, R.-H., and Dai, L.-R. (2005, March 18-23). Sliding window
smoothing for maximum entropy based intonational phrase prediction in Chinese.
Proceedings of the 2005 IEEE International Conference on Acoustics, Speech, and Signal
Processing (ICASSP V5), Philadelphia, PA, USA, 285-288.
[337] Liataud, J. P., and Moloney, M. L. (1983, March 8). DIP switch. USPTO Issued Patent
US4376234, Filing Date: 5 May 1981, Issue Date: 8 March 1983.
[338] Licensing revenue remains steady, [Online]. (No date). Baltimore, Maryland, USA: School
of Medicine, Johns Hopkins University. Available:
http://www.hopkinsmedicine.org/webnotes/licensing/0210.cfm [2008, September 3].
[339] Lilly, G. M. (2004, December 7). Device for and method of one-way cryptographic hashing.
USPTO Issued Patent US6829355, Filing Date: 5 March 2001, Issue Date: 7 December 2004.
[340] Limayem, M., Khalifa, M., and Chin, W. W. (2004, November). Factors motivating software
piracy: A longitudinal study. IEEE Transactions on Engineering Management, 57(4), 414-
425.
[341] Lin, H. C. (1999, October 19). Dual inline package switch. USPTO Issued Patent
US5967302, Filing Date: 6 March 1998, Issue Date: 19 October 1999.
[342] Liu, Q. Y. [刘 清彦] (Trans,), (2001, June). 補 圆曲线 公钢密 码导引 talents]. Taipei
[台北], Taiwan (ROC) [中华 民国]: Lin Yu Cultural Enterprise Co. Ltd. [林 郁文 化 事业有
限 公司], (in Chinese language).
295
[343] Livingston, J. (1996). Crime & Criminology. Upper Saddle River, New Jersey, USA:
Prentice-Hall, Inc.
[344] Lockard, J. L. (1977, March 1^;. Miniature switch with substantial wiping action. USPTO
Issued Patent US4012608, Filing Date: 25 March 1975, Issue Date: 15 March 1977.
[345] Lockard, J. L. (1979, September 18). Impedance programming DIP switch assembly. USPTO
Issued Patent US4168404, Filing Date: 3 May 1978, Issue Date: 18 September 1979.
[346] Log This, [Online]. (No date). Available:
http://membersJycos.co.uk/wuul/logthis/readme.html [2008, March 25].
[347] Low, S. H., and Maxemchuk, N. F. (1998, May). Performance comparison of two text
marking methods. IEEE Journal on Selected Areas in Communications, 7(5(4), 5ol-572.
[348] Lu, C.-S. (2002, December 9-11). Wireless multimedia error resilience via a data handling
technique. Proceedings of the 2002 IEEE Workshop on Multimedia Signal Processing, St.
Thomas, US Virgin Islands, USA, 316-319.
[349] Lu, C-S. (2005). Multimedia security: Steganography and digital watermarking techniques
for protection of intellectual property. Hershey, PA, USA: Idea Group Publishing.
[350] Luo, H., and Henry, P. (2003, September 7-10). A common password method for protection
of multiple accounts. Proceedings of the 14th IEEE 2003 International Symposium on
Personal Indoor and Mobile Radio Communication (PIMRC 2003 j, Beijing, China, vol. 3,
2749-2754.
[351] Luo, H. Y. [罗华 炎]. (1990). 简明汉 语语法 [Concise Chinese grammar]. Cheras, Kuala
Lumpur, Malaysia: Yakin [雅 景]. (in Chinese language).
[352] Luo, H. Y. [罗华 炎]. (2003). 现代汉 语语法 [Modern Chinese grammar]. Ipoh, Perak,
Malaysia: Seni Hijau [艺 青], (in Chinese language).
[353] Lyons-Burke, K. (2000, October). Federal agency use of public key technology for digital
signatures and authentication (NIST Special Publication 800-25). Gaithersburg, MD, USA:
CSRC (Computer Security Resource Center), NIST.
296
[354] MacGregor, W., Schwarzhoff, T., and Mehta, K. (2007, June). A scheme for PIV visual card
topography (NIST Special Publication 800-104). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[355] MacKenzie, P. D., Oprea, A., and Reiter, M. K. (2003, October 27-30). Automatic generation
of two-party computations (extended abstract). Proceedings of the 10th ACM Conference on
Computer and Communications Security 2003, Washington, D.C., USA, 210-219.
[356] MacKenzie, P. D., and Reiter, M. K. (2001a, May). Networked cryptographic devices
resilient to capture (Tech. Rep. No. DIMACS TR 2001-19), [Online]. New Jersey, USA:
Rutgers (The State University of New Jersey), DIMACS (Center for Discrete Mathematics &
Theoretical Computer Science). Available:
http://dimacs.rutgers.edu/TechnicalReports/abstracts/2001/2001-19.html [2008, July 16].
[357] MacKenzie, P. D., and Reiter, M. K. (2001b, May 14-16). Networked cryptographic devices
resilient to capture. Proceedings of the 2001 IEEE Symposium on Security and Privacy (S&P
2001), Oakland, CA, USA, 12-25.
[358] MacKenzie, P. D., and Reiter, M. K. (2001c, August 19-23). Two-party generation of DSA
signatures (extended abstract). Proceedings of the 21st Annual International Crypto logy
Conference on Advances in Cryptology (CRYPTO 2001), LNCS 2139, Santa Barbara, CA,
USA, 137-154.
[359] MacKenzie, P. D., and Reiter, M. K. (2002, June 26). Methods and apparatus for two-party
generation of DSA signatures. US Published Patent Application 2003/0059041, Filing Date:
26 June 2002.
[360] MacKenzie, P. D., and Reiter, M. K. (2003, November). Networked cryptographic devices
resilient to capture. International Journal of Information Security, 2(1), 1-20.
[361] MacKenzie, P. D., and Reiter, M. K. (2004, August). Two-party generation of DSA
signatures. International Journal of Information Security, 2(3-4), 218-239.
[362] MacKenzie, P. D., and Reiter, M. K. (2006, December 12). Methods and apparatus for
providing networked cryptographic devices resilient to capture. USPTO Issued Patent
US7149311, Filing Date: 7 February 2002, Issue Date: 12 December 2006.
297
[363] Macuch, P. L. (2005, November 22). Coaxial and DSL cable switch for controlling a
computer connection to the Internet. USPTO Issued Design Patent D511749, Filing Date: 17
November 2003, Issue Date: 22 November 2005.
[364] Maghiros, L, Punie, Y., Delaitre, S., Lignos, E., Rodriguez, C, Ulbrich, M., Cabrera, M.,
Clements, B., Beslay, L., and van Bavel, R. (2005). Biometrics at the frontiers: Assessing the
impact on society (Report No. EUR 21585 EN). Seville, Se villa, Spain: European
Commission, Joint Research Centre (JRC), Institute for Prospective Technological Studies
(IPTS).
[365] Malackowski, J. E., and Barney, J. A. (2008, June). What is patent quality? A merchant
banc's perspective, les Nouvelles, [Online] 2008Q\mo), 123-134. Licensing Executives
Society International (LES I). Available:
http://www.lesi.org/content/article_of_the_month.aspx [2008, August 18].
[366] Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S. (2003). Handbook of fingerprint
recognition. New York, NY, USA: Springer- Verlag New York, Inc.
[367] Mann an, M., and van Oorschot, P. C. (2007, September 18-21). Security and usability: The
gap in real-world online banking. Proceedings of the New Security Paradigms Workshop
2007 (NSPW'07), North Conway, New Hampshire, USA, 1-14.
[368] Mann an, M., and van Oorschot, P. C. (2008, July 29). Digital objects as passwords.
Proceedings of the 3rd US EN IX Workshop on Hot Topics in Security (HotSec '08), San Jose,
California, USA, 1-6.
[369] Manoharan, S., and Wu, J. (2007, January 2-7). Software licensing: A classification and case
study. Proceedings of the 1st International Conference on the Digital Society 2007 (I CDS
2007), Le Gosier, Guadeloupe, French Caribbean, paper 33.
[370] Mambo, M., Usuda, K., and Okamoto, E. (1996, September 20). Proxy signature: Delegation
of the power to sign messages. IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, E79-A(9), 1338-1353.
[371] Manber, U. (1996). A simple scheme to make passwords based on one-way functions much
harder to crack. Computers & Security, 75(2), 171-176.
298
[372]
Markoff, J. (2008, October 20). A robot network seeks to enlist your computer. The New
York Times, [Online]. Available:
http://www.nytimes.com/2008/10/21/technology/internet/21botnet.html [2008, October 23].
[373] Marshall, D. (2003). .NET security programming. Indianapolis, IN, USA: Wiley.
[374] Matias, Y., Mayer, A., and Silberschatz, A. (1997, December 8-11). Lightweight security
primitives for e-commerce. Proceedings of the USENIX Symposium on Internet Technologies
and Systems 1997, Monterey, California, USA, 95-102.
[375] Matthews, P. H. (1997). The concise Oxford dictionary of linguistics. New York, NY:
Oxford University Press.
[376] Maurer, U. (2004, June). New approaches to digital evidence. Proceedings of the IEEE,
92(6), 933-947.
[377] Maxim, P. S., and Whitehead, P. C. (1998). Exploring crime (4th ed.). Woburn, MA, USA:
Butterworth-Heinemann.
[378] McCallister, E., and Ferraiolo, H.. (2006, August). Personal identity verification
demonstration summary (NIST IR 7337). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[379] McClure, S., Scambray, J., and Kurtz, G. (2001, September 26). Hacking exposed: Network
security secrets & solutions (3rd ed.)- Berkeley, California, USA: Osborne / McGraw-Hill.
[380] McCulligh, M. R. (2003, November 4). Password generation method and system. USPTO
Issued Patent US6643784, Filing Date: 14 December 1998, Issue Date: 4 November 2003.
[381] MCMC. (No date). Register of recognised date/time stamp services (Section 70). In Registers
Under The Digital Signature Act 1997, [Online]. Malaysian Communications and
Multimedia Commission (MCMC). Available:
http://www.mcmc.gov.my/registers/DigitalSignature/RecognizesDateTimeStampService/ind
ex. asp [2007, May 23].
[382] McMillan, R. (2008a, June 10). Microsoft hires anti-phishing crusader, [Online]. CIO.com.
Available: http://www.cio.com/article/print/390413 [2008, September 25].
299
[383] McMillan, R. (2008b, July 1). Trojan lurks, waiting to steal admin passwords, [Online].
CIO.com. Available: http://www.cio.com/article/print/421463 [2008, September 10].
[384] McNamara, J. (2003). Secrets of computer espionage: Tactics and countermeasures.
Indianapolis, Indiana, USA: Wiley Publishing, Inc.
[385] MDC. (2002a, September). Copyright Act and Regulations (Act 332). In Laws relating to
intellectual property and cy be daws in Malaysia (pp. 288-408). Kuala Lumpur, Malaysia:
MDC.
[386] MDC. (2002b, September). Digital Signature Act and Regulations (Act 562). In Laws
relating to intellectual property and cy be daws in Malaysia (pp. 479-591). Kuala Lumpur,
Malaysia: MDC.
[387] MDC. (2002c, September). Industrial Designs Act and Regulations (Act 552). In Laws
relating to intellectual property and cy be daws in Malaysia (pp. 409-478). Kuala Lumpur,
Malaysia: MDC.
[388] MDC. (2002d, September). Layout-Designs of Integrated Circuits Act and Regulations (Act
6001). In Laws relating to intellectual property and cy be daws in Malaysia (pp. 606-625).
Kuala Lumpur, Malaysia: MDC.
[389] MDC. (2002e, September). Patents Act and Regulations (Act 291). In Laws relating to
intellectual property and cy be daws in Malaysia (pp. 157-287). Kuala Lumpur, Malaysia:
MDC.
[390] Menezes, A. J., Oorschot, P. C. V., and Van stone, S. A. (1996). Handbook of applied
cryptography. Boca Raton, FL, USA: CRC Press.
[391] Meurer, M. J., and Bessen, J. E. (2008, March 7). Do patents perform like property?,
[Online]. Boston University School of Law Working Paper No. 08-08. Available:
http://papers.ssrn.com/sol3/papers.cfm ?abstrac ᄂ id=l 103143 [2008, August 20].
[392] Meyer, F. J., and Pradhan, D. K. (1991, April). Consensus with dual failure modes. IEEE
Transactions on Parallel and Distributed Systems, 2(2), 214 - 222.
[393] Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our
capacity for processing information. The Psychological Review, 63(2), 81-97.
300
[394] Mitchell, E. D. (1974). Psychic exploration: A challenge for science. New York, NY, USA:
G. P. Putnam's Sons.
[395] Mittelholzer, T. (1999, September 29 - October 1). An information-theoretic approach to
steganography and watermarking. Proceedings of the 3rd International Workshop on
Information Hiding (IH '99), LNCS 1768, Dresden, Saxony, Germany, 1-16.
[396] Mohanty, S. P. (1999). Digital watermarking: A tutorial review, [Online, Tech. Rep.].
Bangalore, Bayaluseeme, Karnataka, India: Indian Institute of Science. Available:
http://citeseer.ist.psu.edu/572262.html [2008, July 17].
[397] Mollin, R. A. (2007a). Codes: The guide to secrecy from ancient to modem times. Boca
Raton, FL, USA: Chapman & Hall/CRC, Taylor & Francis Group.
[398] Mollin, R. A. (2007b). An introduction to cryptography (2nd ed.). Boca Raton, FL, USA:
Taylor & Francis Group, Chapman & Hall/CRC.
[399] Moseley, B. £. (2006, February 2). Method and system for generating passwords. USPTO
Published Patent Application US 2006/0026439, Filing Date: 2 August 2004.
[400] Mossinghoff, G. J. (2005, July 20;. Testimony in the US Senate - Perspectives on patents:
Harmonization and other matters, [Online]. Committee on the Judiciary of the United States
Senate. Available: http://judiciary.senate.gov/testimony.cfm?id=1582&wi ᄂ id=4547 [2007,
October 22].
[401] Mother tongue/bilingual literacy programme for ethnic minorities. (No date). UNESCO
Bangkok, [Online]. Available: http://www.unescobkk.org/index. php?id=222 [2008, October
4].
[402] Moulin, P., and O' Sullivan, J. A. (2003, March). Information-theoretic analysis of
information hiding. IEEE Transactions on Information Theory, 49(3), 563-593.
[403] MylPO. (No date). Copyright, [Online]. Intellectual Property Corporation of Malaysia
(MylPO). Available:
http://www.mipc.gov.my/index.php?option=com_content&task=view&id=18&itemid=19
[2007, May 20].
[404] Nash, A., Duane, W., Joseph, C., and Brink, D. (2001). PKI: Implementing and managing e-
security. Berkeley, CA, USA: Osborne/McGraw-Hill.
301
[405] Nasheri, H. (2004, December 6). Economic espionage and industrial spying. Cambridge,
Cambridgeshire, UK: Cambridge University Press.
[406] Nechvatal, J. (1991, April). Public-key cryptography (NIST Special Publication 800-2).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[407] Nguyen, D., and Widrow, B. (1989, June 18-22). The track backer-upper: An example of
self-learning in neural networks. Proceedings of the International Joint Conference on
Neural Networks 1989 (IJCNN 1989), Washington, D.C., USA, Vol. 2, 357-363.
[408] Nguyen, D., and Widrow, B. (1990, June 17-21). Improving the learning speed of two-layer
neural networks by choosing initial values of the adaptive weights. Proceedings of the
International Joint Conference on Neural Networks 1990 (IJCNN 1990), San Diego, CA,
USA, Vol. 3, 21-26.
[409] Nichols, R. K. (1999). ICSA guide to cryptography. Blacklick, OH, USA: McGraw-Hill.
[410] NIST. (1985a, May 30). Computer data authentication (NIST FIPS Pub 113). Gaithersburg,
MD, USA: CSRC (Computer Security Resource Center), NIST.
[411] NIST. (1985b, May 30). Password usage (FIPS Pub 112). Gaithersburg, MD, USA: CSRC
(Computer Security Resource Center), NIST.
[412] NIST. (1992, April 27). Key management using ANSI X9.17 (NIST FIPS Pub 171).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[413] NIST. (1993, October 5). Automated password generator (NIST FIPS Pub 181).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[414] NIST. (1994a, February 9). Escrowed encryption standard (NIST FIPS Pub 185).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[415] NIST. (1994b, September 28). Guidelines for the use of advanced authentication technology
alternatives (NIST FIPS Pub 190). Gaithersburg, MD, USA: CSRC (Computer Security
Resource Center), NIST.
[416] NIST. (1995a, April 17). Secure hash standard (NIST FIPS Pub 180-1). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
302
[417] NIST. (1995b, October). An introduction to computer security: The NIST handbook (NIST
Special Publication 800-12). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[418] NIST. (1997, February 18). Entity authentication using public key cryptography (NIST FIPS
Pub 196). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[419] NIST. (2000, January 27). Secure signature standard (DSS) (NIST FIPS Pub 186-2 (+
Change Notice)). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center),
NIST.
[420] NIST. (2001, May 2^). Security requirements for cryptographic modules (NIST FIPS Pub
140-2). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[421] NIST. (2002a, March 6). The keyed-hash message authentication code (HMAC) (NIST FIPS
Pub 198). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[422] NIST. (2002b, August 1). Secure hash standard (NIST FIPS Pub 180-2 (+ Change Notice to
include SHA-224)). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center),
NIST.
[423] NIST. (2004, February). Standards for security categorization of federal information and
information systems (NIST FIPS Pub 199). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
[424] NIST. (2005a, July). Questions and answers about the certification and accreditation of PIV
card issuing organizations, [Online]. Gaithersburg, MD, USA: CSRC (Computer Security
Resource Center), NIST. Available: http://csrc.nist.gov/publications/nistpubs/800-79/sp800-
79Q-As.pdf [2008, May 19].
[425] NIST. (2005b, July). Questions and answers regarding certification and accreditation of PIV
card issuing organizations, [Online]. Gaithersburg, MD, USA: CSRC (Computer Security
Resource Center), NIST. Available: http://csrc.nist.gov/publications/nistpubs/800-79/sp800-
79Q-As-Part2.pdf [2008, May 19].
[426] NIST. (2006a, March). Minimum secuirty requirements for federal information and
information systems (NIST FIPS Pub 200). Gaithersburg, MD, USA: CSRC (Computer
Security Resource Center), NIST.
303
[427] NIST. (2006b, March). Personal identity verification (PIV) of federal employees and
contractors (NIST FIPS Pub 201-1 (Change Notice 1)). Gaithersburg, MD, USA: CSRC
(Computer Security Resource Center), NIST.
[428] NIST. (2006c, March 13). Secure signature standard (DSS) (draft) (NIST FIPS Pub 186-3
(Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[429] NIST. (2006d, June). Roadmap to NIST information security documents, [Online Brochure].
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. Available:
http://csrc.nist.gov/publications/CSD_DocsGuide_Trifold.pdf [2008, May 19].
[430] NIST. (2007a, March). Guide to NIST information security documents, [Online].
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. Available:
http://csrc.nist.gov/publications/CSD_DocsGuide.pdf [2008, May 19].
[431] NIST. (2007b, June 12). Secure hash standard (SHS) (draft) (NIST FIPS Pub 180-3 (Draft)).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[432] NIST. (2007c, June 12). The keyed-hash message authentication code (腿 AC) (draft) (NIST
FIPS Pub 198-1 (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[433] NIST. (2007d, July 13). Security requirements for cryptographic modules (draft ) (NIST
FIPS Pub 140-3 (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource
Center), NIST.
[434] NIST. (2008, February 7). Implementation guidance for FIPS PUB 140-2 and the
cryptographic module validation program (NIST FIPS Pub 140-2 IG). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[435] Noble, K. A. (1994). Changing doctoral degrees: An international perspective. Buckingham,
Buckinghamshire, UK: SRHE (The Society for Research into Higher Education) & Open
University Press.
[436] Ocean Tomo, [Online]. (No date). Available: http://www.oceantomo.com [2008, August 21].
[437] Ogletree, T. W. (2000). Practical firewalls. Indianapolis, Indiana, USA: Macmillan
Computer Publishing, Que Corporation.
304
[438] Oppliger, R., and Rytz, R. (2003, September-October). Digital evidence: Dream and reality.
IEEE Security & Privacy Magazine, 7(5), 44-48.
[439] Oram, A. (2008, February). Peer to Patent needs your expertise. Communications of the ACM,
57(2), 19-20.
[440] Ostrander, S., and Schroeder, L. (1974). Handbook of psychic discoveries. New York, NY,
USA: Berkley Publishing Corporation.
[441] Pankaj, S. (2005). Hacking. Darya Ganj, New Delhi, India: APH Publishing Corporation.
[442] Paradowski, M. B. (No date). The benefits of multilingualism, [Online]. Bilingual/Bicultural
Family Network. Available: http://www.biculturalfamily.org/benefitsofmultilingualism.html
[2008, October 4].
[443] Parapsychological Association, [Online]. (No date). Available: http://www.parapsych.org
[2008, October 25].
[444] Parkinson, C. N. (1958). Parkinson's Law: Or the Pursuit of Progress, [Online]. Available:
http://www.adstockwebxom/business-lore/Parkinson's_Law.htm [2008, July 18].
[445] Parkinson, C. N. (2002, September 5). Parkinson's Law: Or the pursuit of progress (new ed.).
London, UK: Penguin Books Ltd.
[446] Parnas, D. L. (2007, November). Stop the numbers game. Communications of the ACM,
5 り (11), 19-21.
[447] PasswordResearch.com, [Online]. (No date). Available: http://www.passwordresearch.com
[2008, September 10].
[448] Patel, D., and Luo, X. (2007, September 28-29). Take a close look at phishing. ACM
Proceedings of the 4th Annual Conference on Information Security Curriculum Development
2007, Kennesaw, Georgia, USA, 210-213.
[449] Pathak, V., and Iftode, L. (2006, March). Byzantine fault tolerant public key authentication in
peer-to-peer systems. Computer Networks: The International Journal of Computer and
Telecommunications Networking, 50(4), 579-596.
305
[450] Pease, M., Shostak, R., and Lamport, L. (1980, April). Reaching agreement in the presence
of faults. Journal of the ACM, 27(2), 228-234.
[451] Peer to Patent - Community patent review, [Online]. (No date). Available:
http://www.peertopatent.org [2008, August 21].
[452] Pelzl, J., Wollinger, T., and Paar, C. (2004, April 5-7). High performance arithmetic for
special hyperelliptic curve cryptosystems of genus two. Proceedings of the International
Conference on Information Technology: Coding and Computing 2004 (ITCC 2004), Las
Vegas, Nevada, USA, Vol. 2, 513-517.
[453] Penguin Popular Classics. (1997). Arabian nights: AM Baba and the forty thieves. London,
UK: Penguin Books, 100-126.
[454] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G. (1999, July). Information hiding - A
survey. Proceedings of the IEEE: Special Issue on Protection of Multimedia Content, 87(1),
1062-1078.
[455] Pfitzmann, B. (1996). Digital signature schemes: General framework and fail-stop
signatures. Berlin, Germany: Springer- Verlag.
[456] Pfitzmann, B., and Waidner, M. (1990). Formal aspects of fail-stop signatures (Tech. Rep.
No. Interner Bericht 22/90), [Online]. Karlsruhe, Baden-Wiirttemberg, Germany: Universitat
Karlsruhe, Fakultat fiir Informatik. Available: http://ftp.arnes.si/pub/packages/crypto-
papers/PfWa_90FSS_formal_IB.ps.gz [2008, July 17].
[457] PGP Corporation. (2006). PGP Desktop 9.0 for windows user's guide. Palo Alto, California,
USA: PGP Corporation, 229-232.
[458] Phillips, E. M., and Pugh, D. S. (2005, June 1). How to get a PhD (4th ed.). Maidenhead,
Berkshire, UK: McGraw-Hill Education, Open University Press.
[459] Pierer, H. V., and Oetinger, B. V. (Eds.)- (2002). A passion for ideas: How innovators create
the new and shape our world. West Lafayette, Indiana, USA: Purdue University Press.
[460] Piatt, J. R. (2006a, August). Benefits of membership: Today's patents rely on IEEE-published
science. IEEE Microwave Magazine, 7(4), 76-77.
306
[461] Piatt, J. R. (2006b, November). Patents - Today's patents rely on IEEE-published science.
IEEE Signal Processing Magazine, 23(6), 8 & 12.
[462] Polk, W. T., Dodson, D. F., and Burr, W. E. (2007, August). Cryptographic algorithms and
key sizes for personal identity verification (NIST Special Publication 800-78-1).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[463] Popular Book [大 众书 局]. (2003). 汉语拼 音 学习卡 [Learning cards of Hanyu Pinyin].
Singapore: Popular Book, (in Chinese language).
[464] Pratt, W. (1997, March 5). Graduate school survival guide, [Online]. Available:
http://www.math.waikato.ac.nz/~seano/grad-school-advice.html [2008, July 21].
[465] Prepared testimony of Adam Jajfe for 15 Feb. 07. (2007, February 15). IPBiz.com. Available:
http://ipbiz.blogspot.com/2007/02/prepared-testimony-of-adam-jaffe-for-15.html;
http://judiciary.house.gov/media/pdfs/jaffe070215.pdf [2008, August 20].
[466] Project 10 wo , [Online]. (2008). Google. Available:
http://www.projectlOtothelOO.com/how_it_works.html [2008, October 13].
[467] Raina, K. (2003). PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act, and
other compliance issues. Indianapolis, Indiana, USA: Wiley Publishing, Inc.
[468] Re, V., Borean, C, Bozzi, C, Carassiti, V., Ramusino, A. C, Piemontese, L., Breon, A. B.,
Brown, D., Clark, A. R., Goozen, R, Hernikl, C, Kerth, L. T., Gritsan, A., Lynch, G.,
Perazzo, A., Roe, N. A., Zizka, G., Roberts, D., Schieck, J., Brenna, E., Citterio, A., Lanni, F.,
Palombo, R, Ratti, L., Manfredi, P. R, Angelini, C, Batignani, G., Bettarini, S., Bondioli, M.,
Bosi, R, Bucci, R, Calderini, G., Carpinelli, A., Ceccanti, M., Forti, R, Gagliardi, D., Giorgi,
M. A., Lusiani, A., Mammini, P., Morganti, M., Morsani, F., Neri, N., Paoloni, E., Profeti, A.,
Rama, M., Rizzo, G., Sandrelli, F., Simi, G., Triggiani, G., Walsh, J., Burchat, P., Cheng, C.,
Kirkby, D., Meyer, T. I., Roat, C, Bona, A., Bianchi, F., Gamba, D., Trapani, P., Bosisio, L.,
Delia Ricca, G., Dittongo, S., Lanceri, L., Pompili, A., Poropat, P., Rashevskaia, L, Vuagnin,
G., Burke, S., Callahan, D., Campagnari, C, Dahmes, B., Hale, D., Hart, P., Kuznetsova, N.,
Kyre, S., Levy, S., Long, O., May, J., Mazur, M., Richman, J., Verkerke, W., Witherell, M.,
Beringer, J., Eisner, A. A., Frey, A., Grillo, A. A., Grothe, A., Johnson, R. P., Kroeger, W.,
Lockman, W. S., Pulliam, T., Rowe, W., Schmitz, R. E., Seiden, A., Spencer, E. N., Turri,
M., Walkoviak, W., Wilder, M., Wilson, M., Charles, E., Elmer, P., Nielsen, J., Orejudos, W.,
Scott, L, Zobernig, H., and Laplace, S. (2002, December). The BaBar silicon-vertex tracker:
307
performance, running experience, and radiation-damage studies. IEEE Transactions on
Nuclear Science, 49(6), Part 2, 3284-3289.
[469] Ren, J., and Taylor, R. N. (2007, June). Automatic and versatile publications ranking for
research institutions and scholars. Communications of the ACM, 50(6), 81-85.
[470] Research Evaluation, [Online]. (No date). Available: http://www.scipol.co.uk/re.htm [2008,
September 3].
[471] Risen, W. M., and Covello, D. F. (2000, January 25). Method of protecting against a change
in value of intellectual property, and product providing such protection. USPTO Issued
Patent US6018714, Filing Date: 8 November 1997, Issue Date: 25 January 2000.
[472] Ritter, T. (2001, June 27). The redundancy of English, [Online]. Available:
http://www.ciphersbyritter.com/NEWS6/REDUN.HTM [2008, July 21].
[473] Rivest, R. (1992, April). Request for comments (1321): The MD5 Message-Digest Algorithm
(RFC 1321). Sterling, Virginia, USA: Network Working Group, The Internet Engineering
Task Force (IETF).
[474] Rivest, R. L., Shamir, A., and Adleman, L. (1978, February). A method for obtaining digital
signatures and public key cryptosystems. Communications of the ACM, 27(2), 120-126.
[475] Rivest, R. L., Shamir, A., and Adleman, L. M. (1983, September 20). Cryptographic
communications system and method. USPTO Issued Patent US4405829, Filing Date: 14
December 1977, Issue Date: 20 September 1983.
[476] Roellgen, C. B. (No date). Scalable polymorphic hash function, [Online]. Available:
http://www.pmc-ciphers.com [2008, July 16].
[477] Roellgen, B. (2005, June 15). Wdhrend der laufzeit verdnderbare kryptographische methode
[Cryptographic method modifiable during run time]. EPO Issued Patent EP1069508, Filing
Date: 4 July 2000, Issue Date: 15 June 2005. (Original work publish 2005 in German
language).
[478] Ross, B., Jackson, C., Miyake, N., Boneh, D., and Mitchell, J. C. (2005, July 31 - August 5).
Stronger password authentication using browser extensions. Proceedings of the 14th U SEN IX
Security Symposium (SEC 2005), Baltimore, MD, USA, 17-32.
308
[479] Ruan, F. M, [阮方 民], and Wang, X. [王 晓]. (2005, August). 有组织 犯罪 理论- 中国 黑社
会 性 质组织 犯 非 防 治 研' M [New theorv of organized crime - The research on prevention of
ganglands' crime in China]. Hangzhou [杭 州], Zhejiang Province [浙江 省], China [中国]:
Zhejiang University Press [浙江 大学 出 社], (in Chinese language).
[480] Rubin, K., and Silverberg, A. (2003, August 17-21). Torus-based cryptography. Proceedings
of the 23rd Annual International Cryptology Conference 2003 (CRYPTO 2003), LNCS 2729,
Santa Barbara, California, USA, 349-365.
[481] Rugg, G., and Petre, M. (2004). The unwritten rules of PhD research. Maidenhead,
Berkshire, UK: McGraw-Hill Education, Open University Press.
[482] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel,
M., Banks, D., Heckert, A., Dray, J., and Vo, S. (2001, May 15). A statistical test suite for
random and pseudorandom number generators for cryptographic applications (NIST Special
Publication 800-22). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center),
NIST.
[483] Samuelson, P. (1990, August). Should program algorithms be patented?. Communications of
the ACM, 33(8), 23-27.
[484] Samuelson, P. (2004, June). Why reform the U.S. patent system?. Communications of the
ACM, 47(6), 19-23.
[485] Sandhu, R., deSa, C., and Uanesan, K. (2003, June 19). One time password entry to access
multiple network sites. USPTO Published Patent Application US2003/01 15452, Filing Date:
19 December 2000.
[486] Sandhu, R., deSa, C, and Ganesan, K. (2005a, April 19). System and method for password
throttling. USPTO Issued Patent US6883095, Filing Date: 19 December 2000, Issue Date: 19
April 2005.
[487] Sandhu, R., deSa, C, and Ganesan, K. (2005b, September 6). High security cryptosystem.
USPTO Issued Patent US6940980, Filing Date: 19 December 2000, Issue Date: 6 September
2005.
309
[488] Sandhu, R., deSa, C., and Ganesan, K. (2005c, November 29). System and method for crypto-
key generation and use in crypto system. USPTO Issued Patent US6970562, Filing Date: 19
December 2000, Issue Date: 29 November 2005.
[489] Sandhu, R., deSa, C, and Ganesan, K. (2006a, March 21). Secure communications network
with user control of authenticated personal information provided to network entities. USPTO
Issued Patent US7017041, Filing Date: 19 December 2000, Issue Date: 21 March 2006.
[490] Sandhu, R., deSa, C., and Ganesan, K. (2006b, May 30). One time password entry to access
multiple network sites. USPTO Issued Patent US7055032, Filing Date: 21 May 2004, Issue
Date: 30 May 2006.
[491] Sandhu, R., deSa, C., and Ganesan, K. (2006c, June 20). System and method for generation
and use of asymmetric crypto-keys each having a public portion and multiple private
portions. USPTO Issued Patent US7065642, Filing Date: 19 December 2000, Issue Date: 20
June 2006.
[492] Sandhu, R., deSa, C, and Ganesan, K. (2006d, June 27). System and method for
authentication in a crypto -system utilizing symmetric and asymmetric crypto-keys. USPTO
Issued Patent US7069435, Filing Date: 19 December 2000, Issue Date: 27 June 2006.
[493] Sandhu, R., deSa, C., and Ganesan, K. (2006e, November 2). Laddered authentication
security using split key asymmetric cryptography. USPTO Published Patent Application
US2006/0248333, Filing Date: 22 June 2006.
[494] Sandhu, R., deSa, C., and Ganesan, K. (2006f, December 12). Method and system for
authorizing generation of asymmetric crypto-keys. USPTO Issued Patent US7149310, Filing
Date: 19 December 2000, Issue Date: 12 December 2006.
[495] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006a, August 17).
Asymmetric key pair having a kiosk mode. USPTO Published Patent Application
US2006/0 182276, Filing Date: 14 February 2005.
[496] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006b, August 17).
Roaming utilizing an asymmetric key pair. USPTO Published Patent Application
US2006/0 182277, Filing Date: 14 February 2005.
310
[497] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006c, August 17).
Architecture for asymmetric crypto-key storage. USPTO Published Patent Application
US2006/0 182283, Filing Date: 14 February 2005.
[498] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006d, August 17).
Technique for asymmetric crypto-key generation. USPTO Published Patent Application
US2006/0 184786, Filing Date: 14 February 2005.
[499] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006e, August 17).
Authentication protocol using a multi-factor asymmetric key pair. USPTO Published Patent
Application US2006/0 184787, Filing Date: 14 February 2005.
[500] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006f, August 17).
Multiple factor private portion of an asymmetric key. USPTO Published Patent Application
US2006/0 184788, Filing Date: 14 February 2005.
[501] Sandhu, R. S., Ganesan, R., Cottrell, A. P., Renshaw, T. S., Schoppert, B. J., and Austin, K.
(2007, February 12). Flexible and adjustable authentication in cyberspace. USPTO
Published Patent Application US2007/0199053, Filing Date: 12 February 2007.
[502] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007a, March 8).
Technique for providing multiple levels of security. USPTO Published Patent Application
US2007/0055878, Filing Date: 14 February 2005.
[503] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007b, March 22).
Asymmetric crypto-graphy with rolling key security. USPTO Published Patent Application
US2007/0067618, Filing Date: 17 January 2006.
[504] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007c, November
8). Multifactor split asymmetric crypto-key with persistent key security. USPTO Published
Patent Application US 2007/025 85 85, Filing Date: 5 May 2006.
[505] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007d, November
8). Secure login using a multifactor split asymmetric crypto-key with persistent key security.
USPTO Published Patent Application US 2007/025 85 94, Filing Date: 5 May 2006.
[506] Scalet, S. D. (2005, December 1). How to write good passwords, [Online]. CIO.com.
Available: http://www.csoonline.com/article/print/220721 [2008, September 19].
311
[507] Scalise, C. T. (1999). Intellectual property protection reform: Theory, evidence and policy.
Singapore: National University of Singapore, Singapore University Press.
[508] Scarf one, K., and Dicoi, D. (2007, August 2). Wireless network security for IEEE
802.1 la/b/g and Bluetooth (draft) (NIST Special Publication 800-48 Revision 1 (Draft)).
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST.
[509] Schiffman, M. D. (2003). Building open source network security tools: Components and
techniques. Indianapolis, Indiana, USA: Wiley Publishing Inc.
[510] Schmeh, K. (2001). Cryptography and public key infrastructure on the Internet. Chichester,
West Sussex, UK: John Wiley & Sons Ltd. (Original work published 2001 in German
language).
[511] Schneider, J. (2004, December 9). Graphical event-based password system. USPTO
Published Patent Application US2004/0250138, Filing Date: 18 April 2003.
[512] Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and code in C (2nd ed.)-
New York City, New York, USA: John Wiley & Sons.
[513] Schneier, B. (2000). Secrets & lies: Digital security in a networked world. New York, NY,
USA: John Wiley & Sons.
[514] Schneier, B. (2006, December 14). MySpace passwords aren't so dumb, [Online]. Wired
News. Available:
http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300 [2008,
June 11].
[515] Schneier, B. (2007, January 11). Secure passwords keep you safer, [Online]. Wired News.
Available:
http://www.wired.com/politics/security/commentary/securitymatters/2007/01/72458 [2008,
June 11].
[516] Sejarah Melayu [The Malay Annals]. (1954). Singapore: Malaya Publishing House Ltd.
(Original work published 1896 in Jawi language).
[517] Setty, N., and Gentry, R. L. (2002). Inventorship - A practical guide to determining correct
inventorship, [Online]. Needle & Rosenberg, Atlanta, Georgia. Available:
http://www.needlerosenberg . com/Library/w 1 2^248. doc [2008, July 18].
312
[518] Shannon, C. E. (1948, July & October). A mathematical theory of communication. Bell
System Technical Journal, 27, 379-4ZJ & 623-656.
[519] Shannon, C. E. (1949, October). Communication theory of secrecy systems. Bell System
Technical Journal, 28, 65o- /
[520] Shannon, C. E. (1951, January). Prediction and entropy of printed english. Bell System
Technical Journal, 30(1), 50-64.
[521] Shellabear, W. G. (1975). Sejarah Me lay u [The Malay Annals]. Kuala Lumpur, Malaysia:
Penerbit Fajar Bakti Sdn. Bhd. (In Malaysian language).
[522] Shelton, R. H. (2007, March 29). System and method of licensing intellectual property assets.
USPTO Published Patent Application US 2007/0073625, Filing Date: 27 September 2005.
[523] Siegel, L. J. (2005, March 1). Criminology (9th ed.). Florence, KY, USA: Cengage Learning,
Inc., Wadsworth Publishing (URL: http://www.wadsworth.com) (URL:
http://www.cengage.com).
[524] Silverman, J. H. (1986). The arithmetic of elliptic curve. New York, NY, USA: Springer-
Verlag New York, Inc.
[525] Simmons, G. J. (1984, April 9-11). The subliminal channel and digital signatures.
Proceedings of the Advances in Crypto logy (EUROCRYPT '84) (aka Proceedings of the
Workshop on the Theory and Application of Cryptographic Techniques 1984), LNCS 209,
Paris, France, 364-378.
[526] Simmons, G. J. (1998, May). The history of subliminal channels. IEEE Journal on Selected
Areas in Communications, 7(5(4), 452-462.
[527] 新加坡 女郎 患 湿 疫无指 纹纹机 场通关 检查花 45 分 鐘 [Singaporean Female having eczema
has no nngerprint spending 45 minutes to get through the airport immigration office]. (2008,
August 22-23). 星 洲 曰 报 [Sin Chew Daily], [Online], p. 17. Available:
http://search.sinchew-i.com/node/192066 [2008, September 1].
[528] Singh, S. (1999). The code book: The secret history of codes & code-breaking. London, UK:
Fourth Estate Limited, 1-32, 79-80.
313
[529] Singh al, A., Winograd, T., and Scarfone, K. (2007, August). Guide to security web services
(NIST Special Publication 800-95). Gaithersburg, MD, USA: CSRC (Computer Security
Resource Center), NIST.
[530] Siu, H. S., Chin, Y. H., and Yang, W. P. (1998a, April). Byzantine agreement in the presence
of mixed faults on processors and links. IEEE Transaction on Parallel and Distributed
Systems, 9(4), 335-345.
[531] Siu, H. S., Chin, Y. H., and Yang, W. P. (1998b, July). Reaching strong consensus in the
presence of mixed failure types. Information Sciences, 108{\-4), 157-180.
[532] Smith, A. J. (1990, April). The task of the referee. IEEE Computer, 23(4), 65-71.
[533] Spafford, E. H. (1992a, May). Opus: Preventing weak password choices. Computers &
Security, 77(3), 273-278.
[534] Spafford, E. H. (1992b, September 14-17). Observations on reusable password choices.
Proceedings ofUSENIX3rd Symposium on UNIX Security, Baltimore, MD, USA, 299-312.
[535] Spafford, E. H. (1993). What is a Ph.D. dissertation? , [Online]. Available:
http://spaf.cerias.purdue.edu/〜spa^Archive/spaf.html [2008, August 2].
[536] Spours, P. (2006, April). How to exploit patents for profit, [Online]. IP Review, 14. Available:
http://wwwxpaglobalxom/ip-review-online/1221/how_to_exploit_patents_for_profit [2008,
September 3].
[537] Stallings, W. (1995). Protect your privacy: A guide for PGP users. Englewood Cliffs, NJ,
USA: Prentice Hall.
[538] Stallings, W. (2000). Network security essentials: Applications and standards. Upper Saddle
River, New Jersey, USA: Prentice Hall.
[539] Stallings, W. (2005). Wireless communications & networks (2nd ed.)- Upper Saddle River,
NJ, USA: Pearson Prentice Hall.
[540] Stallings, W. (2006a). Computer organization and architecture (7th ed.). Upper Saddle River,
NJ, USA: Pearson Prentice Hall.
314
[541] S tailings, W. (2006b). Cryptography and network security: Principles and practices (4th ed.).
Upper Saddle River, NJ, USA: Pearson Prentice Hall.
[542] S tailings, W. (2007). Data and computer communications (8th ed.)- Upper Saddle River, NJ,
USA: Pearson Prentice Hall.
[543] Standing, L. (1973, May). Learning 10,000 pictures. Quarterly Journal of Experimental
Psychology, 25(2), 207-222.
[544] Standing, L., Conezio, J., and Haber, R. (1970). Perception and memory for pictures: Single-
trial learning of 2500 visual stimuli. Psychonomic Science, 79(2), 73-74.
[545] S tin son, D. R. (2002). Cryptography: Theory and practice. Boca Raton, FL, USA: Chapman
& Hall/CRC Press.
[546] Stubblefield, N. B. (1908, May 12). Wireless telephone. USPTO Issued Patent US887357,
Filing Date: 5 April 1907, Issue Date: 12 May 1908.
[547] Suo, X., Zhu, Y., and Owen, G. S. (2005, December 5-9). Graphical passwords: A survey.
Proceedings of the 21st Annual Computer Security Applications Conference 2005 (ACSAC
2005), Tucson, Arizona, USA, 463-472.
[548] Swanson, M. D., Kobayashi, M., and Tewfik, A. H. (1998, June). Multimedia data-
embedding and watermarking techniques. Proceedings of the IEEE, 86(6), 1064-1087.
[549] Sweet, W. (2007, November). Keeping score in the IP game. IEEE Spectrum, 44(11), 39-41.
[550] Tai, C. L. (2001, December 2^;. Dual in-line type finger-actuated switch. USPTO Issued
Patent US6333479, Filing Date: 4 January 2001, Issue Date: 25 December 2001.
[551] Tan, C. P. (1981, May). On the entropy of the Malay language. IEEE Transactions on
Information Theory, 27(3), 383-384.
[552] Tan, C.-P., and Yap, S.-T. (2001, November 1). Small-sample studies of the entropy of
Chinese (Tech. Rep. No. 6/2000). Kuala Lumpur, Malaysia: University of Malaya, Institute
of Mathematical Sciences.
315
[553] Taplin, R. (2004, October). Protect and survive: Managing intellectual property in the Far
East - The case of Japan, [Online]. Thomson Scientific. Available:
http://scientific.thomson.com/free/ipmatters/bti/8249985/ [2007, May 16].
[554] Tareq Rajab Museum (TSR). (1998-2002). Manuscripts in the TSR Museum, [Online]. Tareq
Rajab Museum, Hawelli, Kuwait. Available: http://www.trmkt.com/manu.html [2008, July
16].
[555] Tavakoli, N. (1991, June 24-28). Information content oi images. Proceedings of the 1991
IEEE International Symposium on Information Theory, Budapest, Hungary, 264.
[556] Taylor, N. (2002). Laser: The inventor, the Nobel laureate, and the thirty-year patent war.
New York City, NY, USA: Simon & Schuster.
[557] Thatcher, M. E., and Pingry, D. E. (2007, October). [Software patents] The good, the bad,
and the messy. Communications of the ACM, 50(10), 47-52.
[558] 圣经 (新约 全书) (中 英对 照) (和合 本) [The Holy Bible (New Testament) (Chinese and
English bilingualed.) (New King James Version)]. (199/ ノ . Nashville, Tennessee, USA:
Thomas Nelson, & Taichung City [台 中 市], Taiwan (ROC) [中華 民國臺 灣]: The Gideons
International (Taiwan (ROC)) [國際 基甸會 中華 民國總 會]. (in Chinese and English
languages).
[559] The official Scrabble players dictionary (3rd ed.)- (2002). Heatherton, Victoria, Australia:
Hinkler Books.
[560] The proof of Parkinson, [Online]. (1969, July 18). Time Magazine. Available:
http://www.timexom/time/magazine/article/0,9171,901078,00.html [2008, July 18].
[561] The Star Online. (2007, June 8). Exchange rate, [Online]. Available:
http://biz.thestar.com.my/business/exchange.asp [2007, June 8].
[562] The Unicode Consortium, Allen, J. D., et al. (Eds.). (2006, November 19). The Unicode
Standard 5.0. Boston, Massachusetts, USA: Addison-Wesley Professional.
[563] The United Nations Convention against transnational organized crime and its protocols,
[Online]. (2004). UNODC (United Nations Office on Drugs and Crime). Available:
http://www.unodc.org/unodc/en/treaties/CTOC/index.html;
316
http://www. 皿 odc.org/documents/treaties/raTOC/Publications/T^
book-e.pdf [2008, July 21].
[564] Thomas, P., and Breitzman, A. (2006a, January 12). The influence of IEEE on key patents,
[Online]. IEEE. Available:
http://www.ieee.org/portal/cms_docs_iportals/discover/sub_pages/IEEE_Key_Patents_2006.
pdf [2008, September 3].
[565] Thomas, P., and Breitzman, A. (2006b, August 1). A method for identiiymg hot patents and
linking them to government-funded scientific research. Research Evaluation, 75(2), 145-152.
[566] Thorpe, J., and van Oorschot, P. C. (2007, August 6-10). Human- seeded attacks and
exploiting hot-spots in graphical passwords. Proceedings of the 16th US EN IX Security
Symposium 2007 (Security 2007), Boston, MA, USA, 103-118.
[567] Tomasi, W. (1998). Electronic communications systems: Fundamentals through advanced
(3rd ed.). Upper Saddle River, NJ: Prentice-Hall.
[568] Tracy, M., Jan sen, W., Scarf one, K., and Butterfield, J. (2007, February). Guidelines on
electronic mail security (NIST Special Publication 800-45 Version 2). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[569] Tracy, M., Jansen, W., Scarfone, K., and Winograd, T. (2007, September). Guidelines on
securing public web servers (NIST Special Publication 800-44 Version 2). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[570] Tsou, B. K., Lai, T. B. Y., and Chow, K.-P. (2004, March 22-24). Comparing entropies
within the Chinese language. Proceedings of 1st International Joint Conference on Natural
Language Processing (IJCNLP 2004), LNCS 3248, Hainan Island, China, 466-475.
[571] Turk, S. A. (2005, Spring). The most important 21st century intellectual property issue.
Chicago-Kent Journal of Intellectual Property, 4(2), 153-155.
[572] Twelve steps to developing an effective first draft of your manuscript, [Online]. (No date).
San Francisco Edit. Available: http://www.cis.nctu.edu.tw/~tzeng/First%20Draftpdf [2008,
August 2].
317
[573] UKCS. (No date a). Commonly quoted 'alternatives' to registration, [Online]. The UK
Copyright Service (UKCS). Available:
http://www.copyrightservice.co.uk/services/alternatives [2007, May 20].
[574] UKCS. (No date b). The registration service, [Online]. The UK Copyright Service (UKCS).
Available: http://www.copyrightservice.co.uk/register/ [2007, June 7].
[575] United Publishing House [联营 出版 有限 公司]. (2001). 最新 汉语 大词典 [修订 版] [The
newest Chinese language big phrase dictionary (revised ed.)]- Seri Kembangan, Selangor,
Malaysia: United Publishing House, (in Chinese language).
[576] United Publishing House [联营 出版 有限 公司]. (2002). 新汉语 字典 [New Chinese
language word/character diction arvj. Sen Kemoangan, Selangor, Malaysia: United
Publishing House, (in Chinese language).
[577] UNODC and organized crime, [Online]. (No date). UNODC (United Nations Office on
Drugs and Crime). Available: http://www.unodc.org/imodc/en/organized-crime/index.html
[2008, July 23].
[578] U.S. Department of Defense. (1985). Password management guideline (Report No. CSC-
STD-002-85) Fort George G. Meade, Maryland, USA: DoD Computer Center.
[579] USCO. (No date). Current fees (July 2007 - j, [Online]. US Copyright Office (USCO).
Available: http://www.copyright.gov/docs/fees.html [2008, May 20].
[580] Recommendations for consideration by the incoming administration regarding the US Patent
and Trademark Office, [Online]. (No date). US Chamber of Commerce (USCOC). Available:
http://dotank.nyls.edu/communitypatent/docs/USCOCRecommendations.pdf [2008,
November 10].
[581] Vacca, J. R. (2007, March 16). Biometric technologies and verification systems. Oxford,
Oxfordshire, UK: Butterworth-Heinemann, p. 280.
[582] Vines, P., and Zobel, J. (1998, October). Compression techniques for Chinese text. Software:
Practice and Experience, 25(12), 1299-1314.
[583] Wag staff Jr., S. S. (2003). Cryptanalysis of number theoretic ciphers. Boca Raton, FL, USA:
Chapman & Hall/CRC Press, 115-117.
318
[584] Wailgum, T. (2008, September 8). Password brain teaser: Too many passwords or not
enough brain power?, [Online]. CIO.com. Available:
http://www.cio.com/article/print/448241 [2008, September 10].
[585] Walker, P. B. (2007, November 8). Intangible property transaction and leaseback business
method. USPTO Published Patent Application US 2007/0260549, Filing Date: 4 May 2006.
[586] Wang, L. [汪 力] (Ed.). (2007, August). 有组织 犯罪 专题 研究 [Research on the topic of
organized crime]. Beijing [北京], China [中国]: People's Publishing House [人民 出版社],
(in Chinese language).
[587] Wang, S. C, and Kao, S. H. (2001, January 31 - February 2). A new approach for Byzantine
agreement. Proceedings of the 15th International Conference on Information Networking
2001 (ICOIN2001), Beppu City, Oita, Japan, 518-524.
[588] Wang, S. C., and Yan, K. Q. (2000, July 4-7). Reaching fault diagnosis agreement on dual
link failure mode. Proceedings of the 7th International Conference on Parallel and
Distributed Systems 2000 (ICPADS 2000), Iwate, Japan, 291-298.
[589] Wang, X., Yin, Y. L., and Yu, H. (2005, August 14-18). Finding collisions in the full SHA-1.
Proceedings of the 25th Annual International Cryptology Conference on Advances in
Cryptology (Crypto 2005), LNCS 3621, Santa Barbara, CA, USA, 17-36.
[590] Wang, X. L. [王 学理], and Pei, D, Y. [裴定 一]. (2006). 摘 圆与超 摘 圆曲线 公钢密 码的理
论ョ 头现 [Theory and implementation of elliptic curve and hyperelliptic curve
cryptography]. Beijing [北京], China [中国]: Science Press [科学 出版社], (in Chinese
language).
[591] Wangerin, W. Jr. [沃 爾特。 溫傑 林] (1999a). The book of God: New Testament [小 說聖
經: 新約 篇]. (Song,B.-Y. [宋碧 雲], Trans,). Taipei City [臺北 市], Taiwan (ROC) [中華
民國臺 灣]: Taiwan Wisdom Publishing Co., Ltd. [臺 灣先智 出版 事業 股份 有限 公司], (in
Chinese language;.
[592] Wangerin, W. Jr. [沃 爾特。 溫傑 林] (1999b). The book of God: Old Testament [小說 聖經:
舊約 篇]. (Gao, Z.-R. [高 志 仁], Trans.). Taipei City [臺北 市], Taiwan (ROC) [中華 民國臺
灣]: Taiwan Wisdom Publishing Co., Ltd. [臺 灣先智 出版 事業 股份 有限 公司], (in Chinese
language).
319
[593] Weinshall, D., and Kirkpatrick, S. (2004, April 24-29). Passwords you'll never forget, but
can't recall. Proceedings of the Conference on Human Factors in Computing Systems 2004
(CHI 2004), Vienna, Austria, 1399-1402.
[594] Weiss, R. P., and South, N. (Eds.)- (1998). Comparing prison systems: Toward a
comparative and international penology. Amsterdam, The Netherlands: OP A (Overseas
Publishers Association) under the license from GIB (Gordon and Breach Publishers).
[595] Wiener, M. J. (1990, May). Cryptanalysis of short RSA secret exponents. IEEE Transactions
on Information Theory, 36(3), 553-558.
[596] Wikipedia Contributors. (2006, March 14). Statutory damages, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Statutory_damages&oldid=43705331 [2007, May
23].
[597] Wikipedia Contributors. (2007a, January 13). Four corner method, [Online]. Wikipedia The
Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Four_corner_method&oldid=100425004 [2007,
June 2].
[598] Wikipedia Contributors. (2007b, February 10). Password policy, [Online]. Wikipedia The
Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Password_policy&oldid=106996972 [2007, June
2].
[599] Wikipedia Contributors. (2007c, February 26). Chinese input methods for computers,
[Online]. Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Chinese_inpu ᄂ methods_for_computers&oldid=ll
1110951 [2007, June 2].
[600] WiKipedia Contributors. (2007d, March 17). Chinese character encoding, [Online].
WiKipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Chinese_character_encoding&oldid= 115862258
[2007, June 2].
[601] WiKipedia Contributors. (2007e, March 31a). Statutory damages for copyright infringement,
[Online]. Wikipedia The Free Encyclopedia. Available:
320
http://en.wikipedia.org/w/index.php?title=Statutory_damages_fo ᄂ
oldid= 11 9234996 [2007, May 23].
[602] Wikipedia Contributors. (2007f, March 31b). Typeface, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Typeface&oldid=119171254 [2007, June 2].
[603] Wikipedia Contributors. (2007g, April 5). ASCII art, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=ASCII_art&oldid=120415207 [2007, June 2].
[604] Wikipedia Contributors. (2007h, April 5). Chinese character, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Chinese_character&oldid= 1205 19979 [2007, June
2].
[605] WiKipedia Contributors. (2007i, June 6). Berne Convention for the Protection of Literary and
Artistic Works, [Online]. Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Beme_Convention_for_the_Protection_of_Literar
y_and_Artistic_Works&oldid=136381222 [2007, June 7].
[606] Wikipedia Contributors. (2007j, September 13). First to file and first to invent, [Online].
Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Firs ᄂ to_file_and_firs ᄂ to_inve^
86 [2007, October 22].
[607] Wikipedia Contributors. (2007k, September 20). TIA/E1A-568-B, [Online]. Wikipedia The
Free Encyclopedia. Available: http://en.wikipedia.Org/w/index.php ?title=TIA/EIA-568-
B&oldid=159241053 [2008, January 24].
[608] Wikipedia Contributors. (20071, September 26). Registered jack, [Online]. Wikipedia The
Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Registered_jack&oldid=160450633 [2008, January
24].
[609] Wikipedia Contributors. (2007m, September 27). Modular connector, [Online]. Wikipedia
The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Modular_connector&oldid= 160734170 [2008,
January 24].
321
[610] Wikipedia Contributors. (2007n, October 4). Gordon Gould, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Gordon_Gould&oldid=162298481 [2007, October
10].
[611] Wikipedia Contributors. (2007o, October 6). Power over Ethernet, [Online]. Wikipedia The
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Power_over_Ethernet&oldid=162586392 [2008,
January 24].
[612] Wikipedia Contributors. (2007p, October 7). Category 5 cable, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Category_5_cable&oldid=162908384 [2008,
January 24].
[613] Wikipedia Contributors. (2007q, October 7). Hacker (computer security), [Online].
Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Hacker_%28computer_security%29&oldid= 16295
3161 [2008, January 24].
[614] Wikipedia Contributors. (2007r, December 2). Penology, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Penology&oldid=175222217 [2008, July 23].
[615] Wikipedia Contributors. (2008a, March 6). Monolingualism, [Online]. Wikipedia The Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Monolingualism&oldid=196315794 [2008, July
23].
[616] Wikipedia Contributors. (2008b, March 8). Patent Reform Act of 2005, [Online]. Wikipedia
The Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Patent_Reform_Act_of_2005&oldid=197359847
[2008, May 20].
[617] Wikipedia Contributors. (2008c, March 10). Linguistic demography, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Linguistic_demography&oldid= 197 188475 [2008,
July 23].
322
[618] Wikipedia Contributors. (2008d, April 26). Ocean Tomo LLC, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Ocean_Tomo_LLC&oldM [2008,
August 21].
[619] Wikipedia Contributors. (2008e, May 5). Patent Reform Act of 2007, [Online]. Wikipedia
The Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Patent_Reform_Act_of_2007&oldid=210421848
[2008, May 20].
[620] Wikipedia Contributors. (2008f, May 7). Redundancy (information theory), [Online].
Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Redundancy_%28informatior ᄂ theory%29&oldid=
210871144 [2008, May 20].
[621] Wikipedia Contributors. (2008g, May 15). CamelCase, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=CamelCase&oldid=21268m [2008, May 20].
[622] Wikipedia Contributors. (2008h, May 30). Theoretical linguistics, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=TheoreticalJinguistics&oldid=216055905 [2008,
July 23].
[623] Wikipedia Contributors. (2008i, June 21). Coefficient of inefficiency, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Coefficien ᄂ of_Inefficiency&oldid=2209695 34
[2008, July 23].
[624] Wikipedia Contributors. (2008j, June 21). Language policy, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Language_policy&oldid=220714548 [2008, July
23].
[625] Wikipedia Contributors. (2008k, June 22). Petname, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Petname&oldid=220857363 [2008, July 16].
323
[626] Wikipedia Contributors. (20081, July 3). Short-term memory, [Online]. AVikipedia the Free
Encyclopedia. Available: http://en. wikipedia. org/w/index.php?title=Short-
term_memory&oldid=223406253 [2008, July 23].
[627] Wikipedia Contributors. (2008m, July 7). List of writing systems, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=List_of_writing_systems&oldid=224239367 [2008,
September 1].
[628] Wikipedia Contributors. (200 8n, July 8). Timeline of computer security hacker history,
[Online]. Wikipedia The Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Timeline_of_computer_security_hacker_history&
oldid=224341103 [2008, July 16].
[629] Wikipedia Contributors. (2008o, July 9). Cryptographic hash function, [Online]. AVikipedia
the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Cryptographic_hash_function&oldid=224604390
[2008, July 17].
[630] Wikipedia Contributors. (2008p, July 9). List of multilingual countries and regions, [Online].
Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Lis ᄂ of_multilingua ᄂ countries_and_regions&oldi
d=224607350 [2008, July 23].
[631] Wikipedia Contributors. (2008q, July 11). Cronyism, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Cronyism&oldid=225^ [2008, July 23].
[632] Wikipedia Contributors. (2008r, July 11). MD5, [Online]. Wikipedia the Free Encyclopedia.
Available: http://en.wikipedia.org/w/index.php?tifle=MD5&oldid= 225 () 4 l 24 4 [2008, July
16].
[633] Wikipedia Contributors. (2008s, July 12). Criminology, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Criminology&oldid=225212774 [2008, July 23].
[634] Wikipedia Contributors. (2008t, July 13). Dissertation, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Dissertation&oldid=225330900 [2008, July 14].
324
[635] Wikipedia Contributors. (2008u, July 15). Applied linguistics, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Applied_linguistics&oldid=225753837 [2008, July
23].
[636] Wikipedia Contributors. (2008v, July 15). Moore's Law, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia,org/w/index.php?title=Moore%27s_law&oldid=^ [2008, July
16].
[637] Wikipedia Contributors. (2008w, July 15). SHA hash functions, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=SHA_hash_functions&oldid=225763377 [2008,
July 16].
[638] Wikipedia Contributors. (2008x, July 17). Parkinson's Law, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Parkinson%27s_law&oldid=226138504 [2008,
July 23].
[639] Wikipedia Contributors. (2008y, July 19). Corpus linguistics, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Corpus_linguistics&oldid [2008, July
23].
[640] Wikipedia Contributors. (2008z, July 19). Text corpus, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Text_corpus&oldid=226566944 [2008, July 23].
[641] Wikipedia Contributors. (2008aa, July 21). First language, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=First_language&oldid=227072714 [2008, July 23].
[642] Wikipedia Contributors. (2008ab, July 21). Second language, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Second_language&oldid=226939389 [2008, July
23].
325
[643] Wikipedia Contributors. (2008ac, July 22). Ethnologue list of most spoken languages,
[Online]. Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Ethnologue_lis ᄂ of_mos ᄂ spoken_languages&oldi
d=227286397 [2008, July 23].
[644] Wikipedia Contributors. (2008ad, July 22). List of languages by number of native speakers,
[Online]. Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=List_of_languages_by_number_of_native_speaker
s&oldid=227300820 [2008, July 23].
[645] Wikipedia Contributors. (2008ae, July 22). Multilingualism, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Multilingualism&oldid=227240877 [2008, July
23].
[646] Wikipedia Contributors. (2008af, July 22). Organized crime, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Organized_crime&oldid=227261189 [2008, July
23].
[647] Wikipedia Contributors. (2008ag, July 22). SMS language, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=SMS_language&oldid=22^ [2008, July 23].
[648] Wikipedia Contributors. (2008ah, July 22). Text messaging, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Text_messaging&oldid=227309098 [2008, July
23].
[649] Wikipedia Contributors. (2008ai, July 23). Language, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Language&oldid=227357180 [2008, July 23].
[650] Wikipedia Contributors. (2008aj, July 23). Sans-serif, [Online]. Wikipedia the Free
Encyclopedia. Available: http://en.wikipedia.org/w/index.php?title=Sans-
serif&oldid=227325014 [2008, July 23].
326
[651] Wikipedia Contributors. (2008ak, July 23). Serif, [Online]. Wikipedia the Free Encyclopedia.
Available: http://en.wikipedia.org/w/index.php?title=Serif&oldid=22734154^ [2008, July
23].
[652] Wikipedia Contributors. (2008al, August 9). Digital identity, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Digital_identity&oldid=230770248 [2008, August
25].
[653] Wikipedia Contributors. (2008am, August 11). OpenlD, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=OpenID&oldid=231207285 [2008, August 16].
[654] Wikipedia Contributors. (2008an, August 12). Alcatel-Lucent v. Microsoft, [Online].
Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Alcatel-Lucen ᄂ v._Microsoft&oldid=23 1503895
[2008, September 17].
[655] Wikipedia Contributors. (2008ao, August 15). Inventor (patent), [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Inventor_(patent)&oldid=232136205 [2008,
August 16].
[656] Wikipedia Contributors. (2008ap, August 19). Information Card, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Information_Card&oldid=233004113 [2008,
August 23].
[657] Wikipedia Contributors. (2008aq, August 27). Writing system, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Writing_system&oldid=234534887 [2008,
September 1],
[658] Wikipedia Contributors. (2008ar, September 8). List of languages by total number of
speakers, [Online]. Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=List_of_languages3y_total_number_of_speakers
&oldid=237048814 [2008, October 4].
327
[659] Wikipedia Contributors. (2008as, September 18). Long-term memory, [Online]. Wikipedia
the Free Encyclopedia. Available: http://en. wikipedia. org/w/index.php?title=Long-
tera 니 nemory&oldid=239249968 [2008, October 4].
[660] Wikipedia Contributors. (2008at, September 23). CJK Unified Ideographs, [Online].
Wikipedia the Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=CJK_Unified_Ideographs&oldid=240390843
[2008, October 16].
[661] Wikipedia Contributors. (2008au, September 27). Languages by speakers, [Online].
Wikipedia the Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Languages_by_speakers&oldid=241385108 [2008,
October 4].
[662] Wikipedia Contributors. (2008av, October 3). Multilingual education, [Online]. AVikipedia
the Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Multilingual_Education&oldid=242699632 [2008,
October 4].
[663] Wikipedia Contributors. (2008aw, October 4). Working memory, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Working_memory&oldid=242892307 [2008,
October 4].
[664] Wikipedia Contributors. (2008ax, October 9). Spy satellite, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Spy_satellite&oldid=244048302 [2008, October
11]-
[665] Wikipedia Contributors. (2008ay, October 10). GeoEye, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=GeoEye&oldid= 24444 3 5 2^ [2008, October 11].
[666] Wikipedia Contributors. (2008az, October 10). MIFARE, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia,org/w/index.php?title=MIFARE&oldid=24438692^ [2008, October 16].
[667] Wikipedia Contributors. (2008ba, October 12). Unity of invention, [Online]. Wikipedia the
Free Encyclopedia. Available:
328
http://en.wikipedia.org/w/index.php?title=Unity_of_invention&oldid=244841923 [2008.
October 15].
[668] Wikipedia Contributors. (2008bb, October 14). Age of Discovery, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Age_of_Discovery&oldid=245322423 [2008,
October 16].
[669] Wikipedia Contributors. (2008bc, October 15). British Empire, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=British_Empire&oldid=245420209 [2008, October
16].
[670] Wikipedia Contributors. (2008bd, October 23). Botriet, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Botnet&oldid=247128093 [2008, October 23].
[671] Wikipedia Contributors. (2008be, October 23). Disk cloning, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Disk_cloning&oldid=247128872 [2008, October
23].
[672] Wikipedia Contributors. (2008bf, October 23). Disk image, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Disk_image&oldid=247128569 [2008, October
23].
[673] Wikipedia Contributors. (2008bg, October 23). H-index, [Online]. Wikipedia the Free
Encyclopedia. Available: http://en. wikipedia. org/w/index.php?title=H-
index&oldid=247127081 [2008, October 23].
[674] Wikipedia Contributors. (2008bh, October 23). Identity theft, [Online]. Wikipedia the Free
Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Identity_theft&oldid=246961579 [2008, October
23].
[675] Wikipedia Contributors. (2008bi, October 23). Internet bot, [Online]. Wikipedia the Free
Encyclopedia. Available:
329
http://en.wikipedia.org/w/index.php?title=Internet_bot&oldid=247128048 [2008, October
23].
[676] Wikipedia Contributors. (2008bj, October 23). Zombie computer, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Zombie_computer&oldid=247 127637 [2008,
October 23].
[677] Wikipedia Contributors. (2008bk, October 25). Extrasensory perception, [Online]. AVikipedia
the Free Encyclopedia. Available:
http://en.wikipedia.Org/w/index.php ?title=Extrasensory_perception&oldid=247523584 [2008,
October 25].
[678] Wikipedia Contributors. (2008bl, October 25). Psi (parapsychology), [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Psi_(parapsychology)&oldid=2475 24054 [2008,
October 25].
[679] Wikipedia Contributors. (2008bm, October 25). Parapsychology, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title=Parapsychology&oldid=247525788 [2008,
October 25].
[680] Wikipedia Contributors. (2008bn, October 25). Parapsychological Association, [Online].
Wikipedia the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Parapsychological_Association&oldid=2475 24424
[2008, October 25].
[681] Wikipedia Contributors. (2008bo, October 25). Joseph Banks Rhine, [Online]. Wikipedia the
Free Encyclopedia. Available:
http://en.wikipedia.org/w/index.php?title= Joseph Janks_Rhine&oldid=247524655 [2008,
October 25].
[682] Wikipedia Contributors. (2008bp, October 25). List of psychic abilities, [Online]. Wikipedia
the Free Encyclopedia. Available:
http://en. wikipedia. org/w/index.php?title=Lis ᄂ of_psychic_abilities&oldid=247524868
[2008, October 25].
330
[683] Williams, A. (2006, February 16). System and method for patent evaluation using artificial
intelligence. USPTO Published Patent Application US2006/0036632, Filing Date: 11 August
2004.
[684] Williams, L. C. (2002). A discussion of the importance of key length in symmetric and
asymmetric cryptography, [Online]. Bethesda, Maryland, USA: SANS Institute. Available:
http://www.giac.org/practical/gsec/Lorraine_Williams_GSEC.pdf [2008, May 17].
[685] Wilson, A. L. (2008, June 11). Microsoft's CardSpace attacked by researchers, [Online].
CIO.com. Available: http://www.cio.com/article/print/391813 [2008, September 10].
[686] Wilson, C., Grother, P., and Chandramouli, R. (2007, January). Biometric data specification
for personal identity verification (NIST Special Publication 800-76-1). Gaithersburg, MD,
USA: CSRC (Computer Security Resource Center), NIST.
[687] Windows Live ID (aka Microsoft Passport Network), [Online]. (No date). Available:
http://www.passport.net [2008, July 16].
[688] Wingate, P., and Sinden, D. (Eds.). (2002, September). Totltxt: The big Book of little text
messages. New York, NY, USA: Book Sales, Inc. (URL: http://www.booksalesusa.com).
[689] WIPO. (No date). Pre-established damages I statutory damages. In Which kind of damages
are available in IP disputes?, [Online]. WIPO. Available:
http://www.wipo.in t/enforcement/en/faq/judiciary/faq08.html#pre [2007, May 23].
[690] WIPO. (1979, September 28). Berne Convention for the Protection of Literary and Artistic
Works, [Online]. WIPO. Available:
http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html [2007, May 20].
[691] Witty, R. J. (2001, January 30). Best practices for managing PINs and passwords (Tech. Rep.
No. Gartner QA- 12-8664). Stamford, CT, USA: Gartner, Inc.
[692] Wolfgang, R. B., Podilchuk, C. L, and Delp, E. J. (1999, July). Perceptual watermarks for
digital images and video. Proceedings of the IEEE, 87(7), 1108-1126.
[693] Wrixon, F. B. (1998). Codes ciphers & other cryptic & clandestine communication: Making
& breaking secret messages from hieroglyphs to the Internet. New York City, NY, USA:
Konemann, 298-303, 671-672.
331
[694] Wu, T. J. (2003, March 25). System and method for securely logging onto a remotely located
computer. USPTO Issued Patent US6539479, Filing Date: 14 July 1998, Issue Date: 25
March 2003.
[695] Wu, X., Cheng, S., and Xiong, Z. (2001, March). On packetization of embedded multimedia
bitstreams. IEEE Transactions on Multimedia, 3(1), 132-140.
[696] Xu, F. C. [徐梵 澄]. (1984, January). S"hMXH [Fifty Upanishads]. Beijing, China: China
Social Sciences Press [中国 社会 禾斗 누 出版社], (in Chinese language).
[697] Xu, S. [许 慎]. (2001). 说文 解字 [Talking on language and explaining the words]. Hong
Kong SAR, China: Chung Hwa Book [中 华书 局], (in Chinese language).
[698] Yan, J., Blackwell, A., Anderson, R., and Grant, A. (2004, September-October). Password
memorability and security: Empirical results. IEEE Security and Privacy Magazine, 2(5), 25-
31.
[699] Yan, K. Q., and Chin, Y. H. (1988, August). An optimal solution for consensus problem in
an unreliable communication system. Proceedings of the International Conference on
Parallel Processing (ICPP 1988), The Pennsylvania State University, University Park, PA,
USA, Vol. 1: Architecture, 388-391.
[700] Yan, K. Q., Chin, C. H., and Wang, S. C. (1992, June). Optimal agreement protocol in
malicious faulty processors and faulty links. IEEE Transactions on Knowledge and Data
Engineering, 4(3), 266-280.
[701] Yan, K. Q., and Wang, S. C. (2005a, February 25). Reaching fault diagnosis agreement on an
unreliable general network. Information Sciences, 1 70(2-4), 397-407.
[702] Yan, K. Q., and Wang, S. C. (2005b, July). Grouping Byzantine agreement. Computer
Standards & Interfaces, 28(1), 75-92.
[703] Yan, K. Q., Wang, S. C, and Chin, Y. H. (1999, March 12). Consensus under unreliable
transmission. Information Processing Letters, (59(5), 243-248.
[704] Yannakoudakis, E. J., and Angelidakis, G. (1988, November). An insight into the entropy
and redundancy of the English dictionary. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 10(6), 960-970.
332
[705] Yee, K. P., and Sitaker, K. (2006, July 12-14). Passpet: Convenient password management
and phishing protection. Proceedings of Symposium on Usable, Privacy and Security
(SOUPS2006), Pittsburgh, PA, USA, 32-43.
[706] Zhang, H., Xu, B., and Huang, T. (2000, October 14-16). Statistical analysis of Chinese
language and language modeling based on huge text corpora. Proceedings of the 3rd
International Conference on Advances in Multimodal Interfaces (I CM I 2000), LNCS 1948,
Beijing, China, 279-286.
[707] Zheng, Y. (1997, August 17-21). Digital signcryption or how to achieve cost(signature &
encryption) « cost(signature) + cost(encryption) . Proceedings of the 1 7th Annual
International Crypto logy Conference on Advances in Crypto logy (CRYPTO ,9T), LNCS
1294, Santa Barbara, CA, USA, 165-179.
[708] Zhu, Y. F. [祝跃 飞], and Zhang, Y. J. [张亚 娟]. (2006, October). 補 圆曲线 公钢密 码导引
[Guide to elliptic curve cryptography]. Beijing [北京], China [中国]: Science Press [주4 쫓 1 出
社], (in Chinese language).
333
ACRONYMS
2TDEA
2-Key Triple Data Encryption Algorithm
3TDEA
3-Key Triple Data Encryption Algorithm
2TDES
2-Key Triple Data Encryption Standard
3TDES
3-Key Triple Data Encryption Standard
ACM
Association for Computing Machinery
AES
Advanced Encryption Standard
AIPO/OAPI
African Intellectual Property Organization
(Organisation Africaine de la Propriete Intellectuelle)
ANN
Artificial Neural Network
ANN Based BAP Artificial Neural Network Based Byzantine Agreement Protocol
APA American Psychological Association
APWG Anti-Phishing Working Group
ARIPO African Regional Industrial Property Organization
AUTM Association of University Technology Managers
BAP Byzantine Agreement Protocol
BAP-ANN Byzantine Agreement Protocol with Artificial Neural Network
BGP Byzantine Generals Problem
BTIRDM Budapest Treaty on the International Recognition of the Deposit of Microorganisms
for the Purposes of Patent Procedure
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart
CII Computer-Implemented Invention
CIS Cryptography & Information Security
CLJ Crime, Law, and Justice
CLPP Chinese Language Passphrase
CLPW Chinese Language Password
CM Communication Management
CO Central Office
CSPRNG Cryptographically Secure Pseudo-Random Number Generator
DES Data Encryption Standard
DHCP Dynamic Host Configuration Protocol
DIL/DIP Dual In-Line Package
DNS Domain Name System
DNS SEC Domain Name System Security Extensions
DSA Digital Signature Algorithm
DSS Digital Signature Standard
EAPO Eurasian Patent Organization
334
ECC Elliptic Curve Cryptography
EMAIL Electronic Mail
EPO European Patent Office
ESP Extra-Sensory Perception
EU European Union
FAR False Acceptance Rate
FCN Fully Connected Network
FFC Finite Field Cryptography
FOREX Foreign Exchange
FRR False Rejection Rate
FTP File Transfer Protocol
FTPS FTP over SSL
GCC Gulf Cooperation Council
GCCPO Gulf Cooperation Council Patent Office
HDD Hard Disk Drive
HMAC Keyed- Hash Message Authentication Code
HTTP Hypertext Transfer Protocol
HTTPS HTTP over SSL
IACR International Association for Cryptologic Research
IATUL International Association of Technological University Libraries
IDC Identity-Based Cryptography
IEEE Institute of Electrical and Electronics Engineers, Inc.
IEICE The Institute of Electronics, Information and Communication Engineers
(電子 情報通信 学会)
IETF Internet Engineering Task Force
IFC Integer Factorization Cryptography
IIPA International Intellectual Property Alliance
ILBS International Law Book Services
IM Instant Messaging
IMAP4 Internet Message Access Protocol version 4
IP Intellectual Property
IPOS Intellectual Property Office of Singapore
IPR Intellectual Property Right
IRC Internet Relay Chat
ITRC Identity Theft Resource Center
JPO Japan Patent Office ( 日 本 経済 産業 省 特許庁 )
MaC Message Authenncation Code
MCMc Malavsian Communications and Multimedia Commission
MDC Multimedia Development Corporation Sdn Bhd
335
MDeC Multimedia Development Corporation Sdn Bhd
MePKC Memorizable Public-Key Cryptography I Memorizable Public-Key Cryptosystem
MIME Multipurpose Internet Mail Extensions
MITM Man In The Middle
MoPKC Mobile Public-Key Cryptography
MTSO Mobile Telephone Switching Office
MY Malaysia
MylPO Intellectual Property Corporation of Malaysia (Perbadanan Harta Intelek Malaysia)
NBER National Bureau of Economic Research
NIST National Institute of Standards and Technology
OAPI/AIPO Organisation Africaine de la Propriete Intellectuelle
(African Intellectual Property Organization)
OSCAR Open System for CommunicAtion in Realtime
(AOL Instant Messenger Protocol for ICQ and AIM)
OTP One-Time Password
PAKE Password- Authenitcated Key Exchange
PCPIP Paris Convention for the Protection of Industrial Property
PCT Patent Cooperation Treaty
PGP Pretty Good Privacy
Ph.D. Doctor of Philosophy
PKC Public-Key Cryptography
PKC Public-Key Cryptosystem
PLT Patent Law Treaty
PNAS Proceedings of the National Academy of Sciences
POP3 Post Office Protocol version 3
P.R.C. People's Republic of China ( 中华 人民 共和国)
PRNG Pseudo-Random Number Generator
PSTN Public Switched Telephone Network
RFC Request for Comments
RFID Radio Frequency Identification
Rlogin Remote Login in UNIX Systems
RNG Random Number Generator
R.O.C. Republic of China (中華 民國)
RSA Ri vest- Sh amir- Adleman Public-Key Cryptography
S/MIME Secure I Multipurpose Internet Mail Extensions
SATA Serial Advanced Technology Attachment
SD Statutory Declaration
SFTP Secure FTP over SSH
SHA Secure Hash Algorithm
336
SHS Secure Hash Standard
SIP Session Initiation Protocol
SMTP Simple Mail Transfer Protocol
SIPO State Intellectual Property of the P.R.C. ( 中华人 民 共和 国 国 家 知 识产权 局 )
SMS Short Message Service
SNMP Simple Network Management Protocol
SPC Strasbourg Patent Convention
SPEKE Simple Password Exponential Key Exchange
SPLT Substantive Patent Law Treaty
SRP-6 Secure Remote Password Protocol version 6
SSH Secure Shell
SSL Secure Sockets Layer
TAC Transaction Authorisation Code or Transaction Authentication Code
TAP Transaction Authorization Pin
TELNET Telecommunication Network
TIPO The Intellectual Property Office of Ministry of Economic Affairs, R.O.C.
( 中 華 民 國經濟 部 智慧 財產 局)
TLS Transport Laver Security
TRIPS Agreement on Trade Related Aspects 01 intellectual Property Rights
TSIG Transaction SIGnature Protocol
TSA Timestamping Authority
TSP Time-Stamp Protocol
TTP Trusted Third Party
UI Utility Innovation
UK United Kingdom
UKCS UK Copyright Service
UN United Nations
UNESCOBKK UNESCO Bangkok
UNODC United Nations Office on Drugs and Crime
US United States
USA United States of America
USB Universal Serial Bus
USCO US Copyright Office
USCOC US Chamber of Commerce
USPTO US Patent and Trademark Office
MSVS Microsoft Visual Studio
WIPO World Intellectual Property Organization
WTO World Trade Organization
337