Skip to main content

Full text of "Memorizable Public-Key Cryptography (MePKC) & Its Applications (version 3.0)"

See other formats


MEMORIZABLE PUBLIC-KEY 
CRYPTOGRAPHY (MePKC) & ITS 
APPLICATIONS 
Third draft (version 3.0) 



LEE KOK WAH 



DOCTOR OF PHILOSOPHY 
MULTIMEDIA UNIVERSITY 
APRIL 2011 



MEMORIZABLE PUBLIC-KEY 
CRYPTOGRAPHY (MePKC) & ITS 
APPLICATIONS 



BY 

LEE KOK WAH 

B. Eng. (Hons.) (Electrical Eng.), University of Malaya, Malaysia 

M.Eng.Sc. (Computer Communications), Multimedia University, 

Malaysia 



THESIS SUBMITTED IN FULFILMENT OF THE 
REQUIREMENT FOR THE DEGREE OF 
DOCTOR OF PHILOSOPHY 

(by Research) 
at the 

Faculty of Engineering & Technology 



MULTIMEDIA UNIVERSITY 
MALAYSIA 

April 2011 



Copyright License of This Open-Source Book 



The copyright of this thesis, i.e. print edition, electronic edition, 
etc., as a remix and derivative from an online publication (14 Mar. 2009) 
at a website [i.e. http://www.archive.com/details/MemorizablePublic- 
keyCryptographymepkcItsApplications] for public peer review (Lee, 
2009a), belongs to the author under the terms of the Copyright Act 1987 
in Malaysia and international treaties, as qualified by Regulation 4(1) of 
the Multimedia University (MMU) Intellectual Property Regulations. So 
far for this Regulation 4(1), there exists only one mutual agreement 
between the author and MMU about the patent right of anti-hacking data 
storage using improved DIP switch in Malaysia. 

The author, hereby, grants the reader an open-source copyright 
license, which is revocable, perpetual, worldwide, non-exclusive, non- 
transferable and royalty-free, needs attribution to the originality of 
resources, charges free, non-commercial, and no derivatives. This license 
type is alike the current common license of IEEE articles, which is for 
personal use and no derivatives. For commercial and other usages, please 
get a written permission from the author. To know more on the attributes 
of this open-source copyright license, please refer to an article by 
Engelfriet (2010). 

© Lee Kok Wah, 30 April 201 1 
All rights reserved. 



ii 



DECLARATION 



I hereby declare that the novel works have been done by myself and no portion of the 
work contained in this thesis has been submitted in support of any application for any 
other normal doctorate degree (i.e. Ph.D.) or qualification at this or any other 
university or institute of learning. 



LEE Kok Wah 



iii 



ACKNOWLEDGEMENT 



I hereby would like to express my gratitude to the following persons together 
with their inputs that have been given me in completing the electronic book of this 
PhD research project, which has contributed mainly in the novel knowledge field of 
key /password security leading to the memorizable public-key cryptography 
(MePKC) and its applications. Here are the listees: 

(i) My parents, relatives and friends together with those anonymous people 

- For help and giving me the physical, emotional and spiritual supports. 

(ii) The nine investors, Malaysia 

- For a total financial investment at about MYR$20,000 on the patent rights 
of DIP switch. 

(iii) Lake-Tee Khaw, University of Malaya, Kuala Lumpur, Malaysia 

- For giving the advantages and disadvantages of SD (Statutory Declaration). 

(iv) Gita Radhakrishna, Multimedia University (MMU), Melaka, Malaysia 

- For supplying the legal contents about copyright. 

(v) Alan Wee-Chiat Tan, Multimedia University, Melaka, Malaysia 

- For supplying C++ class of big number arithmetic after my given idea; and 

- For being a nominal PhD supervisor since 16 August 2008 till 14 April 
2009 and from 08 February 2010 till 20 March 2011. 

(vi) Voon-Chet Koo, Multimedia University, Melaka, Malaysia 

- For prototyping the RJ45 switch using conventional DIP switch on PCB. 

(vii) Hong-Tat Ewe, Multimedia University, Cyberjaya, Malaysia 

- For being a nominal PhD supervisor since 27 May 2004 till 15 August 
2008; and 

- For having lots of unpleasant and trust-less interactions. 

(viii) Matt Bishop, University of California at Davis, CA, USA 

- For supplying a proceedings paper. 

(ix) Alex X. Liu, Michigan State University, MI, USA 

- For supplying a journal paper. 

(x) Chee-Onn Chow, University of Malaya, Kuala Lumpur, Malaysia 



iv 



- For supplying a journal paper. 

(xi) Ching-Weng Hong, Multimedia University, Melaka, Malaysia 

- For conducting an experiment to look for the bounds of key strengthening. 

(xii) Those three external thesis examiners 

- For their criticisms to improve further the format and contents of this thesis. 

(xiii) Vishnuvajjula Charan Prasad (Prof.), Multimedia University, Melaka, Malaysia 

- For assisting to finalize the thesis format acceptable by MMU. 

- For being a PhD supervisor since 21 March 2011 till 27 May 2011 or later. 



V 



DEDICATION 



特将这 本 博士 级 研究 论 文献 给于我 敬 爱的父 亲李厚 芳和母 亲徐亚 妹。 



This normal doctorate thesis is dedicated to my respected and beloved parents, 
Hew-Fong Lee and Ah-Mooi Choi. 



H-( A _ A )-H 

Find me Xpree or XpreeLi in the Internet! 



AAA Mottoes AAA 
Chinese: 语言与 文字 是 了解 一 个 文化的 终极 密铜。 
Japanese: 言語 (げ ん ご) と 文字 (も じ) は 文化 (ぶ んか) のか ぎ です。 
English: Language and Writing are the ultimate keys to understand a culture. 
Malay: Bahasa dan Tulisan adalah kunci-kunci terdasar untuk memahami satu ketamadunan. 



0— * 



vi 



ABSTRACT 



This normal doctorate (i.e. Ph.D. degree in engineering) thesis proposes four 
main novel knowledge contribution components in the knowledge field of 
information security generally, and key management particularly. Kok-Wah Lee the 
author aims to realize the MePKC (Memorizable Public-Key Cryptography) by using 
fully mnemonic private key. 

The prior arts of private key storage since year 1976 are encrypted private 
key, split private key, and roaming private key. Memorizability of secret key at a 
practical maximum key size at 100 bits has been an obstacle or open hard problem 
for about 30 years. A following problem is how to support a great number of needed 
passwords for important offline and online accounts. 

Firstly, the author proposes 2D (Two-Dimensional) key input method and 
system to create high-entropy secret key. 2D key is in a 2D space to exceed the limits 
of single-line password field, due to its graphical nature to have mnemonic for easy 
memorizability, big key size till 256 bits, and high randomness to resist guessing 
attack and dictionary attack. Possible key styles of 2D key include multiline 
passphrase, crossword, ASCII art I Unicode art, colourful text, and sensitive input 
sequence. 

Secondly, multihash key is proposed to have one master key from 2D key to 
generate multiple slave keys using key strengthening, hash truncation, and optional 
identity name (ID) or domain name (URL) for both the offline and online accounts. 
Those slave keys can fulfil the technical and legal demands of various cryptographic 
schemes to have different symmetric keys and asymmetric key pairs. 

Thirdly, MePKC is proposed by using ECC (Elliptic Curve Cryptography) to 
use 2D key directly or indirectly via multihash key till 256-bit MePKC. Both 192-bit 
encryption scheme and signature scheme have been tested. 

Lastly, anti -hacking data storage using improved DIP (Dual In-Line Package) 
switch is proposed to securely store original plaintext and decrypted ciphertext from 
virtual hacking over the computer communication network. 



vii 




000 



Figure 0.1a Multiline passphrase 



111111 
111111 
— 11 — — 
—— 11 —— 
—— 11 —— 
111111 
111111 



^이 



002 



Figure 0.1c ASCII art 



HAPPY* 
0*R*K* 
M*INCH 
E*D*U* 
SPELLS 



ᄉ\끼 



001 



figure 0.1b Crossword 



¥¥¥¥¥ 
©©¥©© 
©©¥©© 
©©¥©© 
¥¥¥¥¥ 



003 



Figure O.ld Unicode art 



Figure 0.1 Two-dimensional (2D) key 



Keywords: Key/password security, key management, Dig secret(s) creation methods, 
2D key, multihash key, memorizable public-key cryptography (MePKC), anti- 
hacking data storage. 



Vlll 



TABLE OF CONTENTS 



COPYRIGHT PAGE ii 

DECLARATION iii 

ACKNOWLEDGEMENT iv 

DEDICATION vi 

ABSTRACT vii 

TABLE OF CONTENTS ix 

LIST OF TABLES xiii 

LIST OF FIGURES xiv 

PREFACE XV 

CHAPTER 1: OVERVIEW 1 

1.1 Introduction 1 

1.2 Motivation 1 

1.3 Research Aims 3 

1.4 Research Methodology 4 

1.5 Organisation of the Thesis 4 

CHAPTER 2: LITERATURE REVIEW (PART 1): CONTEMPORARY 

MEMORIZABLE SECRET 7 

2.1 Required Protection Periods and Their Key Sizes 7 

2.2 Review of the Secret for Symmetric Key Cryptosystem 10 
2.2.1 Related Work: Single-Line Key/Password Field 12 

2.3 Review of the Secret for Asymmetric Key Cryptosystem 12 

2.4 Potential Methods to Create Big and Yet Memorizable Secret 14 

CHAPTER 3: LITERATURE REVIEW (PART 2): CREATING BIG 

MEMORIZABLE SECRETS 17 

3.1 Passphrase Generation Methods 17 

3.1.1 Acronym 17 

3.1.2 Full Sentence 18 



ix 



3.1.3 Diceware 18 

3.1.4 Coinware 19 

3.2 Other Matters about Creating Password 20 

3.2.1 Environ Password 20 

3.2.2 Password in Unicode Encoding 20 

3.3 Related Work of 2D Key: Single-Line Key/Password Field 21 

3.4 Key Strengthening 22 

3.5 Memorizable Secret as a Master Key 23 

3.5.1 Introduction 23 

3.5.2 Related Works 26 

3.6 Related Works of MePKC: Storages of Private Key 29 

3.7 Related Prior Arts of Tools to Resist Hacking 30 

3.8 Conclusion 31 

CHAPTER 4: RESEARCH METHODOLOGY (PART 1): CREATING BIG 

MEMORIZABLE SECRET USING TWO-DIMENSIONAL (2D) KEY 32 

4.1 Introduction 32 

4.2 2D Key Input Method 34 

4.3 Styles of 2D Key: Multiline Passphrase 37 

4.4 Styles of 2D Key: Crossword 37 

4.5 Styles of 2D Key: ASCII Art I Unicode Art 37 

4.6 Styles of 2D Key: Colourful Text 39 

4.7 Styles of 2D Key: Sensitive Input Sequence 39 

4.8 Requirement of Key Size for 2D Key 39 

CHAPTER 5: RESEARCH METHODOLOGY (PART 2): 

画 LTIHASH KEY 41 

5.1 Overview 41 

5.2 Introduction 41 

5.3 Basic Model of Multihash Key 42 

5.4 Acceptable Time Bounds of Multihash Key 47 

CHAPTER 6: RESEARCH METHODOLOGY (PART 3): APPLICATIONS 

OF BIG MEMORIZABLE SECRET & MePKC 48 

6.1 Methods and Systems to Create Big Memorizable Secret 48 

6.2 Potential Applications of Available Big Memorizable Secret 48 

6.3 Main Applications for Symmetric and Asymmetric Key Cryptosystems 50 

6.4 Prototyped Applications of Created Big Memorizable Secret(s) 5 1 

6.5 Memorizable Symmetric Key to Resist Quantum Computer Attack 52 

6.6 Memorizable Public-Key Cryptography (MePKC) 53 

6.6.1 The Proposed MePKC Applications 6.4(ii)-(iii) 53 

6.6.2 Selection of ECC Curve to Prototype MePKC Schemes 56 



X 



6.6.3 Encryption Scheme of MePKC 57 

6.6.4 Signature Scheme of MePKC 59 
6.7 Other Cryptographic, Information-Hiding, and Non-Cryptographic 

Applications of Secret beyond 128 bits 60 

CHAPTER 7: RESEARCH METHODOLOGY (PART 4): ANTI HACKING 

DATA STORAGE USING IMPROVED DIP SWITCH 62 

7.1 Overview 62 

7.2 Introduction 62 

7.3 Proposing Improved DIP Switch 64 

7.4 Method and Device to Secure Anti-Hacking Data Storage 66 

7.5 Other Forms of Innovation 67 

CHAPTER 8: RESULTS & DISCUSSIONS 69 

8.1 Overview of Results 69 

8.2 Two-Dimensional (2D) Key 69 

8.2.1 Discussions: High-Entropy Secret 69 

8.2.2 Limitations 70 

8.2.3 Conclusion 70 

8.3 Multihash Key 71 

8.3.1 Discussions: Comparisons 71 

8.3.2 Discussions: Suitable Time Bounds 71 

8.3.3 Limitations 75 

8.3.4 Conclusion 76 

8.4 Memorizable Public-Key Cryptography (MePKC) 76 

8.4.1 Discussions: Enablement of Amazing Functions 76 

8.4.2 Limitations 79 

8.4.3 Conclusion 79 

8.5 Anti-Hacking Data Storage Using Improved DIP Switch 80 

8.5.1 Discussions: Costs and Reliability 80 

8.5.2 Limitations 82 

8.5.3 Conclusion 83 

CHAPTER 9: CONCLUSIONS 84 

9.1 Concise Summary 84 

9.2 Suggestions for Future Research 84 

9.2.1 512-Bit Multihash Key Needs Hash Function beyond 1024 Bits 84 

9.2.2 MePKC Extension to Other Non-Conventional Cryptographic 

Schemes 85 

9.2.3 Big Secret(s) for Information-Hiding and Non-Cryptographic 

Applications 86 

9.2.4 Safety Box Using Computerized Lock 86 



xi 



9.2.5 Provable Security Studies 87 

9.2.6 Statistical Surveys for Various Security Schemes 87 

9.3 Future Development of Keys the Secret 87 

9.4 Conclusions 89 

APPENDIX A: WRITING SYSTEMS OF THE WORLD 90 

APPENDIX B: CHILDREN-MADE 2D KEYS 93 

APPENDIX C: CHRONOLOGY OF MY PhD STUDY 94 

REFERENCES 97 

ACRONYMS 122 

PUBLICATION LIST BY K.-W. LEE 127 



xii 



LIST OF TABLES 



Table 2.1 Minimum symmetric key sizes for different security levels of protection 

8 

Table 2.2 Minimum asymmetric key sizes in equivalent with the security levels of 



symmetric key sizes 9 
Table 2.3 Various key sizes corresponding to the numbers of ASCII characters and 

Unicode (version 5.0) characters 11 
Table 3.1 Passphrase generation from acronym 17 
Table 3.2 Minimum diceware words (7776 word list) for different security levels 

19 

Table 3.3 Conversions between binary and hexadecimal numeral systems 19 
Table 3.4 Environ password 20 
Table 4.1 Various key sizes corresponding to the numbers of ASCII characters, 
Unicode (version 5.0) characters, and settings sufficiency of 2D key 
input method 40 
Table 5.1 Binary-to-text encoding Bin2Txt(H) of multihash key 45 
Table 6.1 Dimensions of 2D key for various symmetric key sizes 50 
Table 7.1 Operating modes of method and device to secure anti-hacking data 

storage 66 
Table 8.1 Comparisons of key management tools 72 
Table 8.2 One-second time bounds of several computer systems 74 
Table A.1 Functional classification of writing systems 91 
Table A.2 List of languages by number of native speakers 92 
Table C.l Development timeline of K. W. Lee's research project 94 



xiii 



LIST OF FIGURES 



Figure 0.1 Two-dimensional (2D) key viii 

Figure 4.1 Operation of 2D key input method and system 33 

Figure 4.2 Pseudocode of 2D key input method and system 35 

Figure 4.3 Styles of 2D key: Multiline passphrase 37 

Figure 4.4 Styles of 2D key: Crossword 37 

Figure 4.5 Styles of 2D key: ASCII art 38 

Figure 4.6 Styles of 2D key: Unicode art 38 
Figure 5.1 Pseudo-code to determine the numbers of hash iteration for multiple 

security levels of multihash key methods and systems 43 

Figure 5.2 Operation of the basic model of multihash key method and system 44 

Figure 5.3 Proposed usages of 20 security levels 46 

Figure 6.1 Generations and applications of one/more big memorizable secrets 49 

Figure 6.2 Operation of MePKC method and system 54 

Figure 6.3 Encryption stage of MePKC encryption scheme (P-192) 58 

Figure 6.4 Decryption stage of MePKC encryption scheme (P-192) 58 

Figure 6.5 Signing stage of MePKC signature scheme (P-192) 59 

Figure 6.6 Verification stage of MePKC signature scheme (P-192) 60 

Figure 7.1 Structural diagram of conventional 10-way DIP switch 65 

Figure 7.2 Structural diagram of proposed 10/ 12- way anti-hacking DIP switch 65 
Figure 7.3 Innovated 10-way 8PST+2PST DIL switch activated in opposite 

direction 68 

Figure 8.1 Overview of the four major novel knowledge contributions 69 

Figure A.1 Writing systems of the world 90 
Figure B.l 2D keys using ASCII art and Chinese characters meaning "twenty first 

day" [二 i - E'] 93 
Figure B.2 2D keys using ASCII art and Chinese characters meaning "cloudy sky 

nurtures the woods" [7、 へ: ォ ] 93 



xiv 



PREFACE 



This thesis is an output documentation of a research project applied on 12 
November 2003 and registered on 27 May 2004 to achieve three aims at one stroke. 
These three aims are to solve an imperative research problem, to develop intellectual 
properties (IPs) to support an entrepreneur ship, and to qualify a person for a doctoral 
degree. 

The proposal defence seminar, first work completion seminar, second work 
completion seminar, notice of thesis submission request, and MMU (Multimedia 
University) approval of this thesis title to enable its experts' evaluation are on 14 
March 2005, 18 February 2008, 2 July 2008, 23 July 2008, and 1 December 2008, 
respectively. Nevertheless, this thesis is mainly prepared in October 2008. 

Upon the author's decision for not furthering his doctoral research studies 
under the Lee Foundation Scholarship as communicated by Professor Michael T.-C. 
Fang due to a sudden author's family constraint, this research project began with its 
idea conception in the end of 2003 by having the official PhD project application 
date on 12 November 2003. It began with the studies of multimedia communications 
security in general and autosophy communications in particular. Then, in October 
2005, some novel ideas were conceptualized on how to protect the data crystal of 
autosophy communications in particular, which was then generalized for any 
common computer data protection, to networked information security, and any 
applications of big secret beyond 128 bits in information engineering. Here, for these 
idea series conceptualized since October 2005 and applied for MMU financing as 
investment to protect the IP (Intellectual Property) rights like patent, MMU refused 
to finance the patent protection but utility model of partial idea series, and gave up 
the patent rights on 25 September 2007 and 29 August 2008. 

Let's create and maintain a networked info-computer age for a more 
paperless, trip-less, petroleum-less, and environment-friendly human society by 
having safer multipartite electronic computer communications as from the original 
and novel knowledge contribution of this research project. 



XV 



The copyright of this thesis is a print edition as a remix and derivative from 
an earlier online electronic publication (Lee, 2009a) in the Internet for public peer 
review. I hereby notify that the novel work have all been done by myself and no 
portion of the work contained in this thesis, except Appendix B to have some new 
and creative child-made ASCII arts by Wei-Tong Chui and Wei-Jian Chui. 

Kok-Wah LEE @ Xpree Jinhua Li (李 国 华 @ 李 锦华) 
Find me Xpree or Xpreeli in the Internet! 

Email: E96LKW@hotmail.com (Home); contact@xpreeli.com (Business) 

URL: www.xpreeli.com/homepage/kwlee.htm (Home); www.xpreeli.com (Business) 

First unpublished draft (06 April 2009) 

Second unpublished draft (17 March 2010) 

Third unpublished draft (30 April 2009) 



xvi 



CHAPTER 1 OVERVIEW 



1.1 Introduction 

The world human population in April 2010 has achieved beyond 6.9 billion. 
At the same time, the world climate, resources, and environment are having red 
alarms on. Information communications technologies (ICT), especially the electronic 
communications of Internet, are believed to be tools to reduce the paper usages and 
transportation demands, as well as to cultivate a global economy with smoother 
demands and supplies. Security, health, food and beverages, accommodation, family, 
career, education, finance, sex, entertainment, sport, etc. are human major concerned 
topics. Their importance is in descending order for a majority of people. 

Here, when ICT is applied to preserve more Earth resources and to conserve 
friendly environment, information security is always a major people concern for 
important computer communications. As for the Internet, identity theft is a serious 
crime in the electronic commerce and electronic government. Yet another serious 
offence is copyright piracy of literary works, software, music, image, and video. Due 
to the hacked computer databases of human records, the rights of privacy and 
publicity are also hard to be controlled and guarded. 

1.2 Motivation 

In term of information security, it mainly consists of cryptology, information 
hiding, and random number generator (RNG). Cryptology further consists of 
cryptography and cryptanalysis. Information hiding further consists of steganography 
and digital watermarking. RNG further consists of hardware RNG and software 
pseudo-random number generator (PRNG). 

To access and control a user identity of an information security system, there 
are four types of authentication factors: What you know like secret, what you have 
like token, what you are like biometrics (Menezes, Oorschot, & Vanstone, 1996; 
Boatwright & Luo, 2007), and whom you know like introducer (Brainard, Juels, 
Rivest, Szydlo, & Yung, 2006), in the ascending order of implementation costs. 



1 



These factors can be used individually or mixed. Among them, password the 
secret is the most prevailing one for applying the symmetric key cryptography in the 
Internet due to the low implementation costs, as well as good hardware and software 
compatibilities. However, a secret, especially a long one, is subject to the 
forgetfulness or the exposure of a secret written down. The situation becomes worse 
when there are lots of accounts to be handled. If a secret is used for multiple accounts, 
there exists domino effect of password reuse problem (Ives, Walsh, & Schneider, 
2004). Moreover, the memorizability size of a secret using the current prior art is 
limited to 128 bits for a protection period of 30 years. To solve these problems, token 
or biometrics, optionally together with a bi-factor using another secret, is used. 

Nevertheless, token has the weaknesses of poor hardware and software 
compatibilities, low portability when number of tokens per user is many, high 
implementation costs due to installation and maintenance, easy loss, possible 
dropping damages, and token cracking (de Koning Gans, Hoepman, & Garcia 2008; 
de Winter, 2008; Garcia, de Koning Gans, Muijrers, van Rossum, Verdult, Schreur, 
& Jacobs, 2008). 

Meanwhile biometrics has the disadvantages of poor hardware and software 
compatibilities, domino effect due to limited biometrics to support multiple accounts, 
no perfect accurate system due to FAR (False Acceptance Rate) and FRR (False 
Rejection Rate), low usability and efficiency due to no universal accessibility and no 
permanent availability from physiological and medical factors (Maghiros, Punie, 
Delaitre, Lignos, Rodriguez, Ulbrich, Cabrera, Clements, Beslay, & van Bavel, 2005) 
like plastic surgery, high implementation costs due to installation and maintenance, 
as well as irreplaceability and irreusability problems of biometrics upon hacking and 
stealth. 

For examples of no universal accessibility of biometrics authentication 
systems, there is no support for homozygotic twins, 5% of human are not fingerprint 
recognition supported (Haylock, No date; Maltoni, Maio, Jain, & Prabhakar, 2003; 
Vacca, 2007, p. 280) due to diseases like eczema ("Singaporean Female," 2008) and 
arthritis, human undergone surgery changing the facial structure needs re-enrolment 
for face recognition, 1.8 aniridia patients out of 100,000 births and patients after laser 



2 



iridotomy to correct angle-closure caused by glaucoma have no iris and are not iris 
recognition supported, eyes alignment problem with camera of blind people and 
patients of pronounced nystagmus (tremor of the eyes) are poorly iris recognition 
supported, wheelchair users have usability problems of camera location and 
insufficient height variation, cataract patients after operation may need re-enrolment, 
and today DNA methods fail to differentiate monozygotic twins. For example of no 
permanent availability, the high biometrics deformation rates of very young and very 
old require frequent re-enrolment. 

For the fourth authentication factor of "whom you know" like introducer and 
referee, even though the authentication burden of the introducee can be relieved, the 
burden has in fact been transferred to the introducer and it is up to the introducer to 
use the authentication factor of what you know, what you have, and/or what you are. 
Furthermore, there exist trust, responsibility, and obligation problems between the 
introducer and introducee. The human interaction models (Kurokawa, 1988, 1990, 
1991, 1997) are then required to analyze the security probability of this factor. 

In view of the limitations of token and biometrics, how good if the 
weaknesses of secret like memorizability and entropy size can be improved until the 
token and biometrics are not needed for majority applications. 

1.3 Research Aims 

Here, the first main focus of this research project is for this direction: 
Methods and systems to create big and yet memorizable secret(s). From a sufficiently 
large and yet memorizable master key, it shall be possible to derive multiple unique 
slave keys for multiple offline and online accounts. These slave keys shall be 
impossible to be used to derive other slave keys. 

For public-key cryptography (PKC), the smallest practically secure private 
key size is 160 bits by using the FFC (Finite Field Cryptography) or ECC (Elliptic 
Curve Cryptography) (Gehrmann & Naskmd, 2005, 2006, 2007; E. Barker, W. 
Barker, Burr, Polk, & Smid, 2007a, 2007b). Using the current prior arts like 
encrypted private key, split private key (Ganesan, 1996b), and roaming private key 
(Baltzley, 2000), there has been no fully memorizable private key yet. 



3 



Here, the second main focus of this research project is to develop fully 
memorizable private key towards MePKC (Memorizable Public-Key Cryptography), 
aka MoPKC (Mobile Public-Key Cryptography). The third research focus is to 
securely store the original plaintext and decrypted ciphertext of the first and second 
foci for various cryptographic applications in the field of information engineering. 

1.4 Research Methodology 

This research project originally contributes novel methods and systems to 
create big and yet memorizable secret(s), and then MePKC for various applications 
in information engineering. As from Spafford (1993), there are three types of 
techniques to prove a model in a computing dissertation: Analytic method using 
formal manipulations, stochastic method using statistical measurements, and building 
a prototype for experimental testing. 

For the research methodology of this research project, the third method of 
building a prototype is used to show that it is possible to create big and yet 
memorizable secret by using 2-dimensional (2D) key (Lee, 2006a, 2008i, 2009c, 
2010a), and further for the practical realization of MePKC (Lee & Tan, 2006; Lee, 
2008j). 

For security strength and protection period of various security schemes in this 
research project, the first method of analytically formal manipulations is needed, 
where Kok-Wah Lee the author has mainly adopted other researchers' analytic and 
experimental results. Since the author cum researcher is an electrical engineer and 
not educated as a mathematician, the reduction-based security (aka provable security) 
approach is only tried on his best effort as time allows. Hence, those cryptographers 
from the mathematics field are expected to carry out some provable security studies 
on the security schemes proposed here, whenever the big secret creation method(s) is 
applied, especially for the MePKC and its applications. 

1.5 Organisation of the Thesis 



4 



Generally, the present invention of this thesis relates to computer 
communications security. Particularly, the present invention relates to key 
management of cryptography and information security. Most particularly, the present 
invention relates to methods and systems to create big and yet memorizable secrets 
that are large enough for the higher levels of security strength of security systems 
like AES-256, 256-bit ECC, 256-bit PRNG, and so on, (where AES stands for 
Advanced Encryption Standard; ECC stands for Elliptic Curve Cryptography; and 
PRNG stands for Pseudo -Random Number Generator), together with their derived 
applications in the general field of information engineering and specific field of 
information security like memorizable public-key cryptography (MePKC). 

Specifically, the present invention broadly provides novel generation method 
and system of big memorizable secrets to practically realize stronger security levels 
of cryptographic, information-hiding, and non-cryptographic applications in the 
information engineering, especially MePKC (Memorizable Public-Key 
Cryptography). 

The first independent embodiment of the present invention is the method and 
system to create big and yet memorizable secrets. The second independent invention 
embodiment is mutlihash key using hash iteration and hash truncation to create 
multiple slave keys from a single master key. From these two independent inventions, 
there are then various types of dependent inventions for various practical applications 
mainly due to the existence of big memorizable secrets, especially the important 
MePKC as the third main novel contribution of this doctorate study. For the fourth 
main novel contribution, Kok-Wah Lee the inventor has proposed an anti -hacking 
data storage using improved DIP (Dual In-Line Package, aka DIL) switch to securely 
keeping the original plaintext and decrypted ciphertext. 

The organisation of this thesis has three components: Preliminary section, 
chapter section, and postscript section. The preliminary section consists of front page, 
copyright page, declaration, acknowledgements, dedication, abstract, table of 
contents, list of tables, list of figures, and prefaces. For the postscript section, it has 
appendices to show the writing systems of the world, children-made 2D keys, and 



chronology of my PhD study; references; acronyms; and a publication list by K.-W. 
Lee. 

There are nine chapters in the chapter section. Chapter 1 is an overview of 
this research project. Chapters 2 and 3 present the literature review in two parts. 
Chapters 4 to 7 are the main body to propose all the four main novel knowledge 
contributions done by Kok-Wah Lee, where they are 2D key, multihash key, MePKC 
and its applications, and anti-hacking data storage using improved DIP switch, 
respectively. Chapter 8 presents the results and discussions on four of the main 
novelty claims. Chapter 9 is the conclusions of this thesis by giving a concise 
summary on the originally contributed novel knowledge and some suggestions for 
future research. 

In details, Chapter 4 proposes a big memorizable secret creation method 
called 2D (two-dimensional) key by entering key styles like multiline passphrase, 
crossword, ASCII art I Unicode art, colourful text, sensitive input sequence, etc., into 
a matrix-like 2D space. 

Chapter 5 presents a method and system called multihash key to generate 
multiple unique slave keys (aka site keys) from a master key for both offline and 
online accounts. This multihash key uses hash iteration and hash truncation. Every 
slave key is computationally infeasible to be used to derive another slave key. The 
multihash key is integrated with 2D key for various applications of big secrets. 

Chapter 6 tells the influential applications of big secrets from the integration 
of 2D key and multihash key. The most important one will be the MePKC, like its 
encryption scheme and signature scheme. 

Chapter 7 is a hardware contribution to further secure the computer 
communications of MePKC from virtual hacking over a connected computer 
communications network like Internet. It is about an anti-hacking data storage using 
improved DIP switch. 



6 



CHAPTER 2 LITERATURE REVIEW (PART 1): 

CONTEMPORARY MEMORIZABLE SECRET 



2.1 Required Protection Periods and Their Key Sizes 

According to Kerckhoffs' law (Schneier, 1996), a cryptosystem shall depend 
100% on the secrecy of password or key only. In the words of Shannon's maxim, it 
means "enemy knows the system". This law makes the civilian cryptosystem to have 
publicly known algorithm except the classified governmental and military 
information. This is needed to gain the public confidence for general daily 
applications from the fear of possible backdoor. There are various applications of 
secret in information engineering. Here, the required protection periods and their key 
sizes are briefly discussed to know how big a memorizable secret shall be. 

If a cryptographic algorithm is securely tested, the required key length in 
character (L c ) of a password will depend on the factors of number of characters (C), 
key space (S), secure period (T), guesses per unit of time (G), and probability of 
guessing (P) (U.S. Department of Defense, 1985). The minimum key length has to be 
able to resist the brute force attack. The relationships of L c , C, S, T, G and P are 
given in Equations (2.1) and (2.2). 

^ = f ( 2 .1) 



■ 



log 2 S 
log 2 C 



(2.2) 



Nowadays, character encoding of ASCII is the most popular computing code. 
ASCII has some key sets of 26 lowercase characters, 26 uppercase characters, 10 
digits, 62 alphanumeric characters, 33 non- alphanumeric characters, 95 printable 
characters, etc. If a key only has symbols of digits, its specialized name is passe ode. 
If a key is long or consists of printable characters, it is named as passphrase. 

There were once three Data Encryption Standard (DES) challenges as in year 
1997, 1998, and 1999. Using the distributed network computing, maximum guesses 
of 2.45x1 9 keys per second was once recorded. For the latest guesses per computer 



as at end of year 2005, it was about 1.5x10 keys per second. The increment rate 
follows the Moore's Law, where computer performance is doubled for every 18 
months. This indicates that strong password has to be longer as time passing by if 
there is no special key processing added. 

Key length in bit (L) means that there are 2" possible keys for n-bit key. By 
year 2010, the required key is 80 bits for symmetric key algorithm as announced by 
U.S. National Institute for Standards and Technology (NIST). Meanwhile, 
asymmetric key algorithm, like RSA, needs 1024 bits to be equivalently strong with 
80-bit symmetric key algorithm as claimed by RSA Security. The key space varies 
and depends on the security requirements. 

For the AES suggested by NIST to replace the DES, it has three types of 
symmetric key sizes. These key sizes are 128, 192, and 256 bits. Therefore, we have 
AES-128, AES-192, and AES-256 to fulfill the demands of security levels at 128, 
192, and 256 bits (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b). For 
other security levels at 80 and 112 bits, NIST suggested two-key Triple Data 
Encryption Algorithm (2TDEA) and three-key Triple Data Encryption Algorithm 
(3TDEA), respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b). 



Table 2.1 Minimum symmetric key sizes for different security levels of protection 



Key Size, bit 


Protection 


# 1 


32 


Individual attacks in "real-time". Only acceptable for authentication tag size. 


#2 


64 


Very short term protection. Obsolete for confidentiality in new systems. 


#3 


72 


Short to medium term of protection depending on organization size. 


#4 


80 


Smallest general purpose level, < 5 years protection. 


#5 


112 


Medium term protection. About 20 years. 


#6 


128 


Long term protection. Good, generic application independent 
recommendation, about 30 years. 


#7 


256 


Foreseeable future. Good protection against quantum computers. 



Password choice depends on the strength and memoriz ability. Strength 
depends on key size in bit. Memorizability depends on number of memorized secrets 
in a human brain. For minimum key sizes at different security levels, it is shown in 
Table 2.1 (Gehrmann & Nashmd, 2005, 2006, 2007). 



8 



For short term memory of English-based digit, Miller (1956) showed an 
average of 7 items plus or minus 2 (7 ± 2) (Jones, 2002). The good option is longer 
key size in bit and still memorizable. Some articles on memory can be referred 
(Baddeley, Thomson, & Buchanan, 1975; Ellis & Hennelly, 1980; Hoosain & Salili, 
1988; Cowan, 2001) and we can see that a user has 6.5 unique passwords in average 
(Florencio & Herley, 2007), or 4 to 5 unrelated keys (Adams & Sasse, 1999). These 
are textual secret; whereas graphical secret has higher memorizability (Standing, 
Conezio, & Haber, 1970; Standing, 1973). 

On the other hand, there are 3 conventional mathematical hard problems used 
in asymmetric key cryptosystem, which is also called public-key cryptosystem. 
These problems are integer factorization problem, discrete logarithm problem, and 
elliptic curve discrete logarithm problem. NIST categorizes the applications of these 
problems for public-key cryptography as integer factorization cryptography (IFC), 
finite field cryptography (FFC), and elliptic curve cryptography (ECC), respectively. 

IFC has a long key size for public and private keys. FFC has a long public 
key and a short private key. ECC has a short key size for public key and private key. 
The minimum asymmetric key sizes for IFC, FFC, and ECC in equivalent with the 
security levels of symmetric key sizes are shown in Table 2.2 (E. Barker, W. Barker, 
Burr, Polk, & Smid, 2007a, 2007b). 



Table 2.2 Minimum asymmetric key sizes in equivalent with the security levels of 

symmetric key sizes 



Security 
(bits) 


IFC 


FFC 


ECC 


Public 


Private 


Public 


Private 


Public 


Private 


80 


1024 


1024 


1024 


160 


160 


160 


112 


2048 


2048 


2048 


224 


224 


224 


128 


3072 


3072 


3072 


256 


256 


256 


192 


7680 


7680 


7680 


384 


384 


384 


256 


15360 


15360 


15360 


512 


512 


512 



A good password has to be strong and memorizaole (Gehringer, 2002). The 
random password with printable ASCII characters is the strongest password but it is 



9 



poor in memorizability (Yan, Blackwell, Anderson, & Grant, 2004). However, 
password with good memorizability tends to be weak password and under the 
password cracking threats of guessing and dictionary attack (Klein, 1990). As time 
lapses, longer key length is needed due to the advancement of computer technology. 
Hence, the trend is the strong and memorizable passphrase or special key processing 
technique like key strengthening is adopted to get rid of the quest of longer key size. 

The most popular email encryption software called Pretty Good Privacy (PGP) 
9.0 (PGP Corporation, 2006) allows a maximum of 255 characters to be the 
passphrase. Microsoft Windows operating systems also have this feature. Methods 
exist on how to create secure keys (Adams, Sasse, & Lunt, 1997; Brown, Bracken, 
Zoccoli, & Douglas, 2004). Thus, a research problem is here asking on how to have 
big enough and yet memorizable secret(s) for various applications in information 
engineering, generally, and information security engineering, particularly. 

2.2 Review of the Secret for Symmetric Key Cryptosystem 

In civilian information security, according to Kerckhoffs' law, a security 
system shall depend fully on the secrecy of a key, and not the algorithmic software 
nor its hardware. The main reason for this law is that public confidence has to be 
earned to show that there is no backdoor in the security system relying solely on the 
secrecy of key, and disclosing its algorithm and hardware to the public, especially 
academic and corporate researchers, for comments. 

For authentication to a security system, it basically has four methods: Secret 
for what you know, token for what you have, biometrics for what you own, and 
person for whom you know. Due to the factors of cost, hardware and software 
compatibilities, password/key the secret is the most popular. Short key is called 
password and long key is called passphrase. The key selection is always the balance 
of the factors of memorizability and security. Long and random key is securer but 
harder to remember. The current prior art of single-line key input field limits the 
practical memorizable key size to a maximum of 128 bits for majority normal users. 

To create longer password called passphrase, there are now four existing 
methods: Sentence-type passphrase, acronym-type passphrase, diceware, and 



10 



coinware. Sentence-type passphrase is memorizable and has long key size, but 
vulnerable to dictionary attack; whereas acronym-type passphrase taking the first, 
last, other locations, or hybrid location is memorizable and resists to dictionary 
attack, but has a small key size. Diceware and coinware use several dices and coins, 
respectively, to randomly select a word from monolingual, bilingual, or multilingual 
wordlists, where they can resist dictionary attack, but memorizability reduces as the 
key size becomes longer. Hence, these passphrase generation methods are still 
insufficient to create random, memorizable, and yet big secret, that can resist 
guessing attack and dictionary attack, to fulfil the need for secret bigger than 128 bits. 



Table 2.3 Various key sizes corresponding to the numbers of ASCII characters and 

Unicode (version 5.0) characters 



Key size (bit) 


80 


96 


112 


128 


160 


192 


256 


384 


512 


Number of ASCII character (6.57 bits) 


13 


15 


18 


20 


25 


30 


39 


59 


78 


Number of Unicode character (16.59 bits) 




6 


7 


8 


10 


12 


16 


24 


31 



According to Bruce Schneier (2006, 2007), for a survey of 34,000 MySpace 
users' passwords, about 99% of the passwords had 12 ASCII characters or less. An 
ASCII character carries about 6.57 bits, which means 99% of the 34,000 MySpace 
passwords had 78.84 bits or less. This reflected the facts that almost all the 
symmetric keys of the current symmetric key cryptosystems in practice reached at a 
key size less than 128 bits. In other words, memorizable key the secret is only 
practically applicable to the current popular symmetric key cryptosystems like 112- 
bit 3TDES (3 -Key Triple Data Encryption Standard) and 128-bit AES (Advanced 
Encryption Standard). However, in a large-scale password habit survey (Florencio & 
Herley, 2007), the average password size is about 40.54 bits, most key size is rare to 
be more than 100 bits, and a user has 6.5 passwords for 25 accounts where 8 
accounts in average are used daily. 

Table 2.3 shows the numbers of ASCII and Unicode (version 5.0) characters 
for various key sizes. In Unicode 5.0, there are 98,884 graphic symbols or 16.59 bits 
per graphic symbol. The repertoire of Unicode graphic symbols can be upgraded 



11 



from time to time in future versions to enlarge the number of graphic symbols. 
Memorizable keys for 192-bit and 256-bit AES are out of the reach of the current key 
management method and system. Hence, need exists to have better key management 
method and system to create larger key/password the secret larger than 128 bits. 

2.2.1 Related Work: Single-Line Key/Password Field 

Conventionally, when secret is used for authentication, single-line key field 
will be the area for a user to enter a key. For the current longest possible key, it is a 
single-line passphrase. Passphrase can be formed from acronym, sentence, diceware, 
and coinware (Lee & Ewe, 2006). Nevertheless, limit exists due to the problems of 
memorizability and ASCII character input from keyboard. The first problem is due to 
the human factor; whereas the second is due to the user interface. These problems 
prohibit the applications of symmetric key sizes at higher security levels, whenever a 
user cannot remember and/or conveniently enter a long single-line passphrase. 

2.3 Review of the Secret for Asymmetric Key Cryptosystem 

Besides the symmetric key cryptography, asymmetric key cryptography or 
public-key cryptography (PKC) is one of the two main components in the field of 
cryptography. PKC emerged in the 1970s (Diffie & Hellman, 1976; Goldwasser, 
1997). Symmetric key cryptosystem has a shared secret key between a pair of users, 
but each PKC user has an asymmetric key pair consisting of a private key known 
only to the user and a public key shared with the other users. Amazingly, PKC can 
solve the key sharing and distribution problems of symmetric key cryptosystem. 
Moreover, PKC can resist the guessing attack, dictionary attack, and pre-computation 
attack that symmetric key cryptosystem is susceptible to. Nevertheless, PKC 
processing speed is about 1000 times slower than the symmetric key cryptography. 
Consequently, PKC and symmetric key cryptosystem have to be used in hybrid mode 
for maximum performance of effectiveness. 

Now, there are three main conventional asymmetric cryptosystems: IFC 
(Integer Factorization Cryptography), FFC (Finite Field Cryptography), and ECC 



12 



(Elliptic Curve Cryptography). IFC is based on the mathematical hard problem of 
integer factorization. FFC is based on discrete logarithm problem. And ECC is based 
on elliptic curve discrete logarithm problem. 

RSA (Rivest-Shamir-Adleman) cryptosystem is a type of IFC being the very 
first practical realization of PKC since 1977. FFC like ElGamal encryption and DSA 
(Digital Signature Algorithm), as well as ECC were firstly introduced in the 1980s. 
Then, there are other PKC based on different mathematical hard problems but not yet 
well-standardized. Nevertheless, so far all the key sizes of asymmetric private key 
for IFC, FFC and ECC are too big to be human-memorizable. The large key sizes of 
RSA cryptosystem for its both private and public keys, as well as FFC cryptosystem 
for its public key, have even caused the USA government to shift to ECC having 
significantly smaller public and private key sizes. For more details on their 
practically secure key sizes, please refer to two NIST articles (E. Barker, W. Barker, 
Burr, Polk, & Smid, 2007a, 2007b). 

Due to the reason that private key is not fully human-memorizable using the 
current prior art, a private key is either fully or partially in the form of a token. In the 
mean time among the prior art, there are three basic methods for private key storage: 
(i) Encrypted private key stored in the local computing system or device; (ii) split 
private key firstly proposed by Ravi Ganesan (1996b) on 18 July 1994 in the US 
Patent US5,557,678; and (iii) roaming private key firstly proposed by Cliff A. 
Baltzley (2000) on 25 November 1998 in the US Patent US6,154,543. All the three 
methods are bi-factor or multi-factor authentication, where at least one factor is a 
secret and another factor is a software token or hardware token. 

The first method of private key storage encrypts the private key using a 
symmetric key and stores ciphertext of private key in the local computing system like 
hard disk drive or a device like smartcard, floppy disk, or USB flash drive. Encrypted 
private key method suffers from the problems of loss, damage, side-channel attacks, 
mobility, hardware and software compatibility, and password domino cracking effect 
of its digital certificate carrying only one asymmetric public key. 

The second method splits a private key into two or more portions, where the 
first portion is a memorizable password or derivable from the memorizable password 



13 



kept by the owner of that private key. The second and possibly other portions of the 
private key are kept by one or more servers in the encrypted form like the first 
method. The first, second and possibly other split portions of the private key may 
also be derived from various authentication factors like token and biometrics. Split 
private key method suffers from the problems of malicious central authority attack 
on the user's short password, dictionary attack on the stolen encrypted partial private 
key, and password domino cracking effect of its digital certificate carrying only one 
asymmetric public key. 

For the third method, roaming private key also has encrypted private key but 
its ciphertext is stored in a network system like server, and owner of the private key 
can download it from anywhere and anytime as long as the user has network access. 
The roaming private key method suffers from the problems of side-channel attacks, 
hardware and software compatibility, malicious central authority, dictionary attack 
on the stolen encrypted private key, and password domino cracking effect of its 
digital certificate carrying only one asymmetric public key. 

In the US Patent US7,1 13,594, Boneh and Franklin (2006) described a new 
type of PKC called identity-based cryptography (IDC). In this method, a user's 
unique public identity like email or phone number is the public key and hence 
memorizable. However, its private key is not memorizable and has to be generated 
by a trusted third party (TTP). 

Notwithstanding, as compared with symmetric key cryptosystem using 
password or key the secret, the popularity of token-based PKC using fully or 
partially encrypted private key, is low due to the problems of mobility convenience, 
implementation costs, hardware and software compatibilities, and management 
difficulty of certificate revocation list. Hence, there exists a need to get rid of fully or 
partially encrypted private key, and to invent key input method to let the private key 
fully human-memorizable as like the symmetric key. 

2.4 Potential Methods to Create Big and Yet Memorizable Secret 

One of the many invented methods here to create big and yet memorizable 
secret is to innovate the graphical password or picture password. From psychological 



14 



studies, it claims that human graphical memory is stronger than human textual 
memory. The graphical password is categorized into recognition-based and recall- 
based methods by Xiaoyuan Suo, Ying Zhu, and G. Scott Owen (2005). For 
recognition-based method, it can be the types of cognometrics and locimetrics. 
Meanwhile for recalled-based method, it can be the type of drawmetrics. 

Passfaces invented by J. H. E. Davies (1997), as in the US Patent 
US5, 608,387, is a type of cognometircs, where a user is requested to recognize some 
pre-selected image sequence of human faces as password. Davies' method has the 
weakness of low entropy per image. For G. Blonder' s method (1996), as in the US 
Patent US5,559,961, it is a type of locimetrics, where a user has to select a few areas 
of an image in sequence as password. Blonder' s method is vulnerable to hot-spot 
attack and shoulder-surfing attack. For Draw-a-Secret scheme by I. Jermyn, A. 
Mayer, F. Monrose, M. Reiter, and A. Rubin (1999), it is a type of drawmetrics, 
where a user draw lines and points on a grid in the form as like a hidden hand 
signature. For this Draw-a-Secret scheme, its weakness is its authentication process 
for either acceptance or rejection is not exact as in the previous two graphical 
password methods, but estimation having FAR (False Acceptance Rate) and FRR 
(False Rejection Rate). 

Besides these three main groups of graphical password, there are icon-like 
graphical password scheme by P. V. Haperen (1997), as in the UK Patent 
Application GB2,313,460, and event-based graphical password scheme by J. 
Schneider (2004), as in the US Patent Application US2004/0250138. The both of 
these latter methods are cognometric. Their common weakness is that the key space 
or password space is limited by the fine differentiation capability of human visual 
memory over images that may have only minor differences. This causes the entropy 
per image selection to be still unsatisfactory not big enough for the demands of 
information engineering for the stronger security levels to carry more bits of strength. 
Hence, need exists to boost the key space of graphical password for higher entropy 
per image selection, and yet still human-memorizable and visually differentiable. 

Another potential method to have big memorizable secret is to create Chinese 
language password (CLPW) through Chinese character encodings and their 



15 



Romanization. T. D. Huang (1985), as in the US Patent US4,500,872, proposed on 
19 February 1985 to use phonetic encoding and symbolic encoding to represent a 
Chinese character. The character space of Chinese language is huge by more than 16 
bits per character and yet human-memorizable and differentiable. This CLPW 
method can also be extended to other CJKV languages due to the common sharing 
for the usages of Han characters (、漢字 or 、汉 字) like Chinese Hanzi, Japanese Kanji, 
Korean Hanja, and Vietnamese Han Tu. However, the current CLPW has a weakness 
that it is subject to dictionary attack. Hence, there exists a need to create CLPW 
resisting the dictionary attack. 

There are some inventions to create password that can resist the dictionary 
attacks. Among them are (i) "System and Method for Generating Unique Passwords" 
by Martin Abadi, Krishna Bharat, and Johannes Marais (2000) in the US Patent 
US6, 141,760; (ii) "Password Generation Method and System" by M. R. McCulligh 
(2003) in the US Patent US6,643,784; (iii) "Method and System for Automated 
Password Generation" by P. M. Goal and S. J. Kriese (2004) in the US Patent 
Application US2004/0 168068; (iv) "Method and Apparatus for Password 
Generation" by M. R. Dharmarajan (2005) in the US Patent Application 
US2005/0 132203; and (v) "Method and System for Generating Passwords" by B. E. 
Moseley (2006) in the US Patent Application US2006/0026439. Nevertheless, even 
though these five methods can resist dictionary attacks, they have lower 
memorizability. Hence, there exists a need not only to have a password generation 
method that can resist dictionary attack, but can have high memorizability as well 
even for a big secret at least and beyond 128 bits. 

Yet another method to create a memorizable secret bigger than the current 
prior art was proposed by Whitfield Diffie and William A. Woods (2006) in their 
patent application filed on 22 June 2006 entitled "Method for Generating Mnemonic 
Random Passcodes", US Patent Application US2007/0300076. However, the 
password created by this method is not yet big enough for many applications in the 
information engineering. 



16 



CHAPTER 3 LITERATURE REVIEW (PART 2): CREATING 
BIG MEMORIZABLE SECRETS 



3.1 Passphrase Generation Methods 

Civilian cryptosystem applies Kerckhoffs' law to have security dependency 
100% on the password secrecy. This reflects the fact that key length and key space 
are very important to ensure enough entropy or randomness to secure a cryptosystem. 
For stronger password, passphrase is suggested. Currently, there are three methods to 
generate passphrase: Acronym, full sentence and diceware. Moreover, an alternate 
method to diceware is proposed by Kok-Wah Lee the author: Coinware (Lee & Ewe, 
2006), by using the coin. This method is not included in detailed in this thesis but 
only brief introduction. For more information, please refer to the published article. 



Table 3.1 Passphrase generation from acronym 



Sentence 


Passphrase 


Passwords should be impossible to remember and never written down 


psbitranwd 


Passwords should be impossible to remember and never written down 


PsBiTrAnWd 


Good or bad, you have to do it. 


Goby,htdi. 


Good or bad, you have to do it. 


Drd,ueoot. 


It may be a few sentences. One, two or more. 


Imbafs.O,tom. 



3.1.1 Acronym 

For the passphrase created using the acronym (Schneier, 1996; PGP 
Corporation, 2006; Yan, Blackwell, Anderson, & Grant, 2004), a user has to 
remember one or a few sentences. Then, the first, second, or last, etc. characters of 
each word in the sentence(s) are joined to form an acronym. Both alphanumeric and 
non- alphanumeric ASCII characters may become the character of the acronym. The 
techniques of capitalization and permutation may be used to increase the randomness. 
This acronym will then act as the key. It has the features of high randomness and 
short key length. The examples of this method are shown in Table 3.1. 



17 



3.1.2 Full Sentence 



The passphrase generation using the acronym is sufficient if the key length 
requirement is short. When the minimum key size demand is long, normally one full 
sentence or a few short sentences are entered directly as the key (Schneier, 1996; 
PGP Corporation, 2006; Yan, Blackwell, Anderson, & Grant, 2004). So far, it is an 
open problem to type the entire phrase into a computer with the echo turned off 
(Schneier, 1996). If the masked password is shown during the password entering 
process, then it will subject to shoulder surfing attack. 

Besides, since the passphrase of full sentence has each word to be selected 
associatively, its randomness is magnitude-wise high but relatively low if password 
ciphertext is available. For example, super-user of any computing system can easily 
obtain ciphertext of the password. By gaining access to the encrypted password, the 
threats of ciphertext-only attack and frequency analysis of short cryptogram (Hart, 
1994; Lee, Teh, & Tan, 2006) are then possible. For instance, the unicity distance of 
English language is about 30 characters. Once the encrypted password is equal to or 
more than the unicity distance, unique decipherability of the encrypted password will 
be feasible. 

3.1.3 Diceware 

Using full sentence for passphrase generation, the word frequency 
distribution can be under computational analysis (Kucera & Francis, 1967). To get 
rid of the association of words, diceware (PGP Corporation, 1996) introduced by A. 
G. Reinhold is an improved passphrase generation method. 

There are many software pseudo-random number generators (PRNGs). 
Unfortunately, they have lots of pitfalls (Eastlake, Crocker, & Schiller, 1994) to ease 
any possible attack. Hence, some hardware random number generators (RNGs) such 
as coin and dice are very much better than the software PRNGs. 

Diceware uses dice to select a word from an ordered word list. The word list 
can be in any language and based on senary or base-6 numeral system. For the most 
popular diceware, it is an English word list with 7,776 (= 6 5 ) words. Five dice values 



18 



are needed to locate one word randomly. Every selected word carries entropy of 
12.92 bits. Table 3.2 shows the minimum diceware words for different security levels. 



Table 3.2 Minimum diceware words (7776 word list) for different security levels 



Key Size (bit) 


32 


64 


72 


80 


112 


128 


256 


Diceware 


word 


3 


5 


6 


7 


9 


10 


20 


bit 


38 


64 


77 


90 


116 


129 


258 



3.1.4 Coinware 

In addition to diceware using dice, we have coinware using coin as proposed 
by (Lee & Ewe, 2006). Coin tossing is conducted to generate random passphrase. 
Each face of the coin is labelled as binary bits "0" and "1", respectively. Four coin 
values are used to derive a hexadecimal digit. Therefore, the word list is in 
hexadecimal order. Table 3.3 shows the conversions between the binary (BIN) and 
hexadecimal (HEX) numeral systems. 



Table 3.3 Conversions between binary and hexadecimal numeral systems 



BIN 


HEX 


BIN 


HEX 


BIN 


HEX 


BIN 


HEX 


0000 





0100 


4 


1000 


8 


1100 


C 


0001 


1 


0101 


5 


1001 


9 


1101 


D 


0010 


2 


0110 


6 


1010 


A 


1110 


E 


0011 


3 


0111 




1011 


B 


1111 


F 



Coinware uses four coins to create one hexadecimal digit. The created word 
lists are in hexadecimal order and can be applied for multilingual passphrase 
generation. Its exemplary application for Chinese language password is very useful. 
Readily-made Chinese character word list in the Unicode CJK unified ideographs 
enables fast hexadecimal reading for random passphrase generation. Hanyu Pinyin 
and Sijiao Haoma are used to Romanize and uniquely represent each Han character. 
Meanwhile, Jyutping and Romaji are used for Cantonese and Japanese languages, 
respectively. 



19 



3.2 Other Matters about Creating Password 

3.2.1 Environ Password 

An analogue to the Romanization of Chinese language to have alphabets and 
digits is the Environ password (Anderson, 2001, p. 49). Good memorizability exists 
when it is linked to a learnt language. For English language, U.K. government 
introduced the case insensitive Environ password in October 2005 for short-term 
protection. It has an 8 -character key pattern as in Table 3.4. This pronounceable 
password has 34.9 bits per unit. 



Table 3.4 Environ password 



Form 


[consonant - vowel - consonant - consonant - vowel - consonant - digit - digit] 
[consonant - vowel - consonant - digit - consonant - vowel - consonant - digit] 


Example 


pinray34, yankan77, supjey56, kinkin99; pin3ray4, yan7kan7, sup5jey6, kin9kin9 



3.2.2 Password in Unicode Encoding 

Unicode unifies the Han characters of CJK languages into CJK unified 
ideographs or Unihan under ISO 10646. There are three major blocks of Han 
characters or Chinese characters in the Unicode character encoding: CJK unified 
ideographs, CJK unified ideographs extension A, and CJK unified ideographs 
extensions B. For the mean time, Unicode Consortium is preparing the CJK unified 
ideographs extension C and CJK unified ideographs extension D. The CJK unified 
ideographs extension C with 4,251 Han characters will be included into the next 
version after Unicode 5.1. 

For Unicode 4.1, the first block lists the Han characters from [4E00] to 
[9FBB] in hexadecimal value. The second block lists from [3400] to [4DB5]. The 
third block lists from [20000] to [2A6D6]. Hence, there are three readily made word 
lists or character lists for Chinese language. These word lists have 20924, 6582 and 
42711 words or characters, respectively. In addition, there are CJK compatibility 
ideographs having 12 characters. For a combined word list, it is a key space of 70229 



20 



characters. After radical exclusion, the key space has about 70000 characters. This 
forms a Chinese language word list with high entropy of 16.10 bits per Han character. 

To start coinware, first flip or toss a coin to randomly select a binary bit "0" 
or "1". If bit "0", the first and second blocks of CJK unified ideographs and CJK 
unified ideographs extension A are chosen. If bit "1", the third CJK block of CJK 
unified ideographs extension B is chosen. Then continue with coin tossing to obtain 
four coin values representing four binary bits. These four binary bits are converted 
into one hexadecimal digit. Repeat coin tossing to get four coin values for another 
three rounds. Four randomly obtained hexadecimal digits will locate the unique Han 
characters in the previously selected CJK block(s). These three blocks are available 
at [URL: http://www.unicode.org/charts/]. If the hexadecimal digits do not hit any 
Han character, get another set of hexadecimal digits. 

Coming to here, the selected Han character will need operating system with 
Chinese language environment to enable computer input. For other languages in 
Unicode encoding, to create password in those languages needs computing support. 
The entropy per key in a particular language depends on its character set in Unicode. 
Nevertheless, for bilingual or multilingual users, larger entropy per key can be 
obtained, especially when one of the languages is Chinese language. 

3.3 Related Work of 2D Key: Single-Line Key/Password Field 

Conventionally, whenever secret is used as the authentication method, single- 
line key field will be the area for a user to enter a key. For the current longest 
possible key, it is a single-line passphrase. For passphrase, it can be formed from 
acronym, sentence, diceware, and coinware. Nevertheless, there is a limit due to the 
problems of memorizability and ASCII character input from keyboard. The first 
problem is due to the human factor; whereas the second is due to the user interface. 
These problems prohibit the applications of symmetric key sizes at higher security 
levels whenever a user cannot remember and/or conveniently enter a long single-line 
passphrase. 



21 



3.4 Key Strengthening 



Key strengthening is also called key stretching. It is used to make a weak key 
stronger. There are two forms of key strengthening. One uses password supplement 
(Manber 1996; Abadi, Lomas, & Needham, 1997; Abadi, Needham, & Lomas, 2000), 
and another uses many rounds of hash iterations (Kelsey, Schneier, Hall, & Wagner, 
1997). In this thesis, key strengthening is applied to achieve larger protection periods 
for symmetric and asymmetric cryptosystems like AES and MePKC. 

K.-W. Lee (2009b) had a computational analysis on the effect of using key 
strengthening as presented again as follows. 

S = n*L*R/P (3.1) 
S = Key space 

n = Number of networked computers 

L = Maximum lifetime of a key in years 

R = Number of guesses per unit of time per unit of computer 

P = Probability that a key can be guessed in its lifetime 

Typical values: 

n= 10 9 units = 29.9 bits 

L = 4, 10, 20, 30, 300 years = 2, 28.2, 29.2, 29.8, 33.1 bits 
R = 1.5 X 10 7 s" 1 = 23.8 bits (best performance in year 2005) 
R = 1 s _1 = bit (using key strengthening) 
p= 10" 6 = -19.9 bits 

Equation (3.1) is a password length equation. When key strengthening is used. 
R becomes 1 guess per second and the variety of computer is a main factor to set the 
number of hash iterations. The computer performance of a variety of computers 



22 



varies from 1 time for the slowest computer to 20 times for the fastest computer. This 
contributes a factor of log220 = 4.3 bits to Equation (3.1). Moore's Law states that 
the number of transistors on an integrated circuit for minimum component cost 
doubles every 24 months. 

S = (n*L*R/P)* 2 4 " 3 * 2 L/2 (3.2) 

When the variety of computers and Moore's Law are considered, it becomes 
Equation (3.2). From Equation (3.2), key strengthening can make a weak key to 
become 19.5 bits stronger. 

3.5 Memorizable Secret as a Master Key 

3.5.1 Introduction 

For friendly environment, cost effectiveness, and efficiency, human 
civilizations are heading towards a paperless and electronic society. Every human is 
getting numerous offline and online accounts. These accounts require authentication 
to gain system access. There are four types of authentication approaches: Secret, 
token, biometrics, and introducer. 

Secret is about something you know like password or key. Token is about 
something you have like smart card. Biometrics is about something you are like 
fingerprint. Introducer is whom you know. For the sake of cost and compatibility, 
secret in the form of key is the most popular authentication approach. 

According to Forrester Research (Kanaley, 2001), an active Internet user 
manages an average of 15 keys on a daily basis. Most people, who are majority-wise, 
not using the password management tools, either maintain the same key for all the 
accounts, write down different keys for different accounts, or keep closely related 
keys for various accounts. These are all poor password management practices. 

The HTTP basic authentication protocol (even over SSL) (Franks, Hallam- 
Baker, Hostetler, Lawrence, Leach, Luotonen, & Stewart, 1999) allows a server to 



23 



know the key of each account. This causes possible malicious server attacks from the 
administrators and crackers. The server may be untrustworthy or compromised. 

For another HTTP specification, i.e. HTTP digest authentication protocol, 
challenge-response protocol is used (Franks, Hallam-Baker, Hostetler, Lawrence, 
Leach, Luotonen, & Stewart, 1999). The server can still see the clients' keys. Since 
the response from a client to a server is not specific to the server, HTTP digest 
authentication protocol is vulnerable not only to malicious server attacks, but 
password file compromise attacks, spoofing attacks, and phishing attacks. 

If a key is reused, the success of an attack on an account in a weak system 
may cause a strong system to be compromised. This password reuse can trigger a 
domino effect from the weakest system to the strongest system (Ives, Walsh, & 
Schneider, 2004). 

Therefore, every key has to be uniquely set for each account, regardless of 
weak or strong system, to get rid of the risk when one system is compromised. 
However, according to (Adams & Sasse, 1999), normal users can only be expected to 
cope with a maximum of four or five keys that are unrelated and regularly used. 
When key relevancy is allowed, a user can cope with average 6.5 unique keys 
(Florencio & Herley, 2007). This reflects the need to balance the usability and 
security. 

To address this problem, some key management tools are invented. These 
tools allow users to remember only one master secret as master key and assign 
unique slave keys (aka site keys) to multiple accounts. They allow users either to 
choose their own master key and then store the slave keys somewhere safe, or to 
assign fixed keys to each website that can be computed whenever they are needed. 

The examples of the first approach are Password Safe and Windows Live ID. 
The examples of the second approach are LPWA (Lucent Personal Web Assistant), 
HP Site Password, Password Multiplier, SPP (Single Password Protocol), PwdHash, 
and Passpet. A special example using the hybrid approach is CPG (Compass 
Password Generator). 

Password Safe is a password vault that can be used for offline and online 
accounts. However, its mobility is low due to the requirement to have a safe storage 



24 



for multiple keys encrypted by a common master key. Another form of solution for 
online accounts only is to use a single sign-on server and its proxy servers. Microsoft 
Windows Live ID (aka Microsoft Passport Network) is one of these examples. Its 
weaknesses are single point of failure and high cost of integration. 

Another method to reduce the memory burden of online account passwords 
uses key hashing and key strengthening (aka key stretching) of a master key 
concatenated with a domain name and optional username. Exemplary applications of 
this method are (i) LPWA (Lucent Personal Web Assistant) (Gabber, Gibbons, 
Matias, & Mayer, 1997); (ii) HP Site Password (aka System-Specific Passwords or 
Site-Specific Passwords) (Karp & Poe, 2002; Karp, 2003); (iii) Password Multiplier 
(Halderman, Waters, & Felten, 2005); (iv) PwdHash (Ross, Jackson, Miyake, Boneh, 
& Mitchell, 2005); and (v) Passpet (Yee & Sitaker, 2006). 

There is also a method using unique random number assignment to different 
online accounts called CPG (Compass Password Generator) (aka Common Password 
Method) (Luo & Henry, 2003). Yet there is another method using the key hashing of 
one-time ticket, server name, and master password to generate different site keys 
(aka slave keys) called SPP (Single Password Protocol) (Gouda, Liu, Leung, & Alam, 
2005). 

All these methods of single master key generating multiple site keys or slave 
keys apply only to online accounts having a domain name. Its weakness is a change 
of master key requires all the accounts to be updated one by one, which is required 
by some key management strategies. 

For offline account, the current prior art uses a password vault to store all the 
unique passwords the secret. These password vaults can be simply an encrypted 
spreadsheet or document file, or application software like Password Safe by Bruce 
Schneier [URL: http://www.schneier.com/passsafe.html]. The disadvantage of 
password vault is its low mobility and danger of disclosing the ciphertext of 
password vault to the public domain. Hence, there exists a need to have a method to 
generate multiple slave keys of online and offline accounts from a master key, and 
yet an individual slave key can be changed without changing the master key and 
other slave keys. 



25 



With the realization of big memorizable secret for cryptographic, 
information-hiding, and non-cryptographic applications, especially MePKC, there 
are even more types of offline accounts like symmetric key, asymmetric private key, 
stego-key, symmetric watermarking key, asymmetric watermarking private key, and 
PRNG seed. Among them, for MePKC cryptographic applications like encryption, 
signature, authentication, key exchange, and other schemes, different schemes 
require a different pair of asymmetric key pair, by the technical and law requirements 
to have a safer electronic information society. Hence, there exists a need to generate 
multiple private keys as slave keys from a common memorizable master key. 

The present invention called multihash key (Lee & Ewe, 2007) can be applied 
to offline and online accounts with good mobility. Domain name is not necessary but 
optionally needed to resist phishing attacks and spoofing attacks. A single sign-on 
server is also not needed. The required components are numeric 4-digit passcode, 
key hashing, key strengthening, and hash truncation. 

To allow diversity of site keys from a single master key, there are two 
optional entries: Username ID and domain name (or website) URL. Domain name 
that is also used to resist phishing attacks can be replaced by adopting an anti- 
phishing tool. In other words, the proposed new method and system can be used 
together with an anti-phishing tool. 

These anti-phishing tools are SpoofStick, Netcraft Toolbar, Earthlink Toolbar. 
SiteKey, DSS with SRP (Dynamic Security Skins with Secure Remote Password 
Protocol), Petname Tool, TrustBar, and Passpet (Yee & Sitaker, 2006). 

3.5.2 Related Works 

Here, the prior arts of key management tools are discussed, where a single 
key can be used for multiple accounts, in a deeper context. Anti-phishing tools will 
not be discussed. Accounts are divided into two types: Offline and online. Offline 
accounts have no domain name while online accounts have domain name. Example 
of offline accounts is file encryption; whereas example of online accounts is email. 



26 



Password Safe is an application software originally developed by Bruce 
Schneier [URL: http://www.schneier.com/passsafe.html]. It uses the Twofish 
encryption algorithm to protect the stored passwords by a master password. Users 
need only to remember one master password to access multiple passwords. Its 
mobility depends on the available password database. It can be used for both offline 
and online accounts, but cannot resist spoofing attacks and phishing attacks. 

Windows Live ID (No date) is also known as "Microsoft Passport Network" 
[URL: http://www.passport.netJ. Jsers need a master password to sign on a central 
server. This central server will authenticate users for multiple servers which have 
joint network. Besides single point of failure, it has high cost of integration. Some 
security loopholes are reported (Kormann & Rubin, 2000). It can be used for online 
accounts only, but can resist phishing and spoofing attacks. 

LPWA (Gabber, Gibbons, Matias, & Mayer, 1997; Matias, Mayer & 
Silberschatz, 1997) uses key hashing of master password and domain name to 
generate a specific site password via a server. It has single point of failure but not the 
high cost of integration. However, the malfunction of central authority will mean the 
breakdown of all services. It can be used for online accounts only and can resist 
phishing and spoofing attacks. Nowadays, it has stopped providing the services. 

HP Site Password (Karp, 2003; Karp & Poe, 2004) is also called "System- 
Specific Passwords" or "Site-Specific Passwords". A master password and a system 
name are concatenated, hashed using MD5 (Rivest, 1992) and converted into Base64 
encoding (Borenstein & Freed, 1992) to get a site password. It is not centralized 
using a server but operates as stand-alone application in the terminal computers. It 
can be used for online accounts only and cannot resist phishing and spoofing attacks. 

It is important to note here there were few successful collision attacks over 
the MD5 in the years 2004-2006. The successor of MD5, which is SHA-1, is also 
discovered to be subject to collision attacks on its reduced version in the years 2004- 
2006. Consequently, NIST announced that SHA-1 would be phased out by the year 
2010 in favour of SHA-2 variants: SHA-224, SHA-256, SHA-384, and SHA-512 
(NIST, 1995a, 2002b, 2007b; Lilly, 2004). 



27 



CPG (Luo & Henry, 2003) is also called "Common Password Method". It 
assigns unique random numbers to different website accounts. The random number is 
hashed using MD5 and converted using a binary-to-text transform to generate a 
specific password for multiple accounts. The random number is encrypted and stored 
in an account server or proxy server. When a user needs to access a specific account, 
the encrypted random number is retrieved from the server, decrypted, hashed, and 
converted into a specific password to authenticate the access. Therefore, it has the 
weakness of single point of failure, but does not involve the high integration cost like 
LWPA. It is for online accounts only and can resist phishing and spoofing attacks. 

Password Multiplier (Halderman, Waters, & Felten, 2005) uses key hashing 
and key strengthening. There are two levels of hash iterations using the inputs of 
username, master password and site name. Both the numbers of hash iterations are 
fixed for 100 seconds and 1/10 second, respectively. It is a stand-alone application 
without using a server and implemented using browser extension to Mozilla Firefox. 
It can be used for online accounts only and can resist phishing and spoofing attacks. 

SPP (Gouda, Liu, Leung, & Alam, 2005) is also a stand-alone application. It 
applies the techniques of challenge-response protocol, one-time server-specific ticket 
and key hashing using MD5 or SHA-1. The site password is hashed from the one- 
time ticket, server name, and master password. Ihe one-time ticket and site password 
will be updated after every login access. It can be used for online accounts only and 
can resist phishing and spoofing attacks. 

PwdHash (Ross, Jackson, Miyake, Boneh, & Mitchell, 2005) is implemented 
using browser extensions to Mozilla Firefox, Internet Explorer, and Opera. Its key 
hashing inputs the domain name of remote site into a pseudo-random function 
controlled by user's master password. The domain name acts as a hash salt. It can be 
used for online accounts only and resist phishing and spoofing attacks. 

Passpet (Yee & Sitaker, 2006) is also implemented using browser extension 
to Mozilla Firefox. It applies the techniques of petname system, key hashing, key 
strengthening, and UI customization. Petname system is a naming system possessing 
the properties of globality, security and memorizability. It is used for anti-phishing 
attacks. Key hashing and key strengthening in Passpet are alike the Password 



28 



Multiplier using the SHA-256, except that its first level of hash iterations is flexible 
in amount allowing updates according to the computer technology advancement 
without changes of software. It uses local storage for login access via a fixed 
machine, and remote storage in a server for login access with mobility feature. The 
remote server stores the first level of hash iterations and site label file that is 
encrypted from the site label list. Due to the dependency of server for newly used 
machines, Passpet has some risks of single point of failure. However, there is no high 
cost of integration. It can be used for online accounts only and can resist phishing 
and spoofing attacks. 

3.6 Related Works of MePKC: Storages of Private Key 

For the current asymmetric key cryptosystem, a private key is normally 
encrypted using another symmetric key. The encrypted private key is stored in a 
local computing system or token; whereas the symmetric key is stored in the human 
brain. The present possible attacks for this method are guessing attack, dictionary 
attack, and pre-computation attack. 

Another method is to split the private key into two or more portions (Ganesan. 
1996b; Bishop, 2003, pp. 264-265). There are other literary works about split private 
key cryptography over here (Ganesan, 1996a, 1998a, 1998b, 1998c, 1999; Ganesan, 
Sandhu, Cottrell, & Austin, 2006a, 2006b, 2006c; Ganesan, Sandhu, Cottrell, 
Schoppert, & Bellare, 2006; Ganesan & Yacobi, 1996; Sandhu, deSa, & Ganesan, 
2003, 2005a, 2005b, 2005c, 2006a, 2006b, 2006c, 2006d, 2006e, 2006f; Sandhu, 
Schoppert, Ganesan, Bellare, & deSa, 2006a, 2006b, 2006c, 2006d, 2006e, 2006f, 
2007a, 2007b, 2007c, 2007d; Sandhu, Ganesan, Cottrell, Renshaw, Schoppert, & 
Austin, 2007). The first portion of the private key can be derived from a normal 
human-memorizable symmetric key. The other portions of the private key are stored 
as encrypted partial private key alike the normal encrypted private key. This method 
resists the pre-computation attack. 

A third method is to store the encrypted private key in a server connected to a 
computer communication network, called roaming private key (Baltzley, 2000, 
2001a, 2001b). A user has the roaming capability where the encrypted private key 



29 



can be downloaded from the server for decryption at anywhere. Proxy servers are 
needed for this method to avoid single point of failure. Its possible attacks are the 
same as encrypted private key stored in the local computing system. 

3.7 Related Prior Arts of Tools to Resist Hacking 

Besides complicated networking settings and firewall software, a simple 
hardware device was proposed by Fonseca (2003) by using a simple push/pull level 
of a switch box to connect or disconnect the networking connection for the hacking 
elimination. Fonseca called it as data line switch and filed for patent in the US on 24 
July 2001. Later, Macuch (2005) designed the data line switch for the applications of 
coaxial and DSL cables to control the computer connection to the Internet. Macuch 
filed for a design patent in the USA on 17 November 2003. Of course, there is yet 
another current practice by some end users to plug and unplug the networking cable. 
Nevertheless, this method suffers from the hook damage of RJ45/RJ11 and 
inconvenience access of networking port. 

Here later, a proposed component with similar function to data line switch is 
also applicable to modular jack (aka modular connector) like RJ45 and RJ11. 
Modular connector was firstly invented by Hardesty (1975), who filed it for patent in 
the US on 6 July 1973. RJ stands for registered jack. RJ45 and RJ11 are used as 
Ethernet jack and telephone jack, respectively. Our new component is innovated 
from the dual in-line package (DIL/DIP) switch by adding a collective actuator, 
which can be slide-type, rocker-type, or piano-type (aka side/level). 

The miniature DIP switch was found in the US patent database to be firstly 
invented by Lockard (1977, 1979), who filed for patent in the US on 25 March 1975 
for the first time. Since then, there are various innovations on the DIP switch. 
Hoffman (1982) had improved the manufacturing of DIP switch. Liataud and 
Maloney (1983) had reduced the size, decreased the cost, and increased the reliability 
of DIP switch. Brown (1983) had created the piano-type DIP switch. In the late 
decade, Lin (1999) and Tai (2001) from Taiwan, R.O.C., had concomitantly 
decreased the size, improved the manufacturing process, and increased the reliability 
of DIP switch. 



30 



Normal slide switch wipes in parallel with the pin pairs. The slide actuator of 
my proposed component wipes transversely to the pin pairs. The first slide switch 
that can be found in the US patent database was invented by Bailey (1969). Even 
though the wiping directions of normal slide switch and our switch are different by 
90° degrees, their function is the same, i.e. to connect and disconnect the poles, 
except the 10-way secure DIP switch oppositely switches two groups of poles. 

3.8 Conclusion 

Till here, we have discussed the prior arts and related works to all the four 
main novel works proposed by me, in which they are (i) 2D key for big and yet 
memorizable secret; (ii) multihash key for multiple offline/online slave keys from 
one master key the big memorizable secret; (iii) MePKC for various public key 
cryptographic schemes using fully memorizable private key; and (iv) anti-hacking 
data storage using improved DIP switch for secure storage of original plaintext and 
decrypted ciphertext from virtual hacking over the computer communication 
networks. All those four major novel knowledge contributions here can act as a 
whole for safer and more convenient electronic computer communications. 



31 



CHAPTER 4 RESEARCH METHODOLOGY (PART 1): 

CREATING BIG MEMORIZABLE SECRET 
USING TWO-DIMENSIONAL (2D) KEY 

4.1 Introduction 

Conventionally, single-line key field is used to input a key. The selection of a 
key depends on the factors of memorizability and security. The minimum key sizes 
for symmetric and asymmetric key cryptosystems are 80 and 160 bits, respectively. 

For symmetric key cryptosystem, National Institute of Standards and 
Technology (NIST) of USA proposed security level of 80-bit key to be phased out by 
year 2015 and used until year 2010 (E. Barker, W. Barker, Burr, Polk, & Smid, 
2007a, 2007b). US government has an export policy to control the power of 
cryptographic algorithm by setting the maximum key size. The current export limit 
of symmetric key size has been raised from 40 bits to 128 bits. 

For the symmetric key cryptosystem of Advanced Encryption Standard 
(AES), there are three key sizes: 128, 192, and 256 bits. The asymmetric key 
cryptosystems, which demand for the minimum private key size at 160 bits by year 
2010, are finite field cryptography (FFC) and elliptic curve cryptography (ECC). 
FFC and ECC are based on the mathematical hard problems of discrete logarithm 
problem and elliptic curve discrete logarithm problem, respectively. The 
corresponding sizes of private keys to the AES are 256, 384, and 512 bits, 
respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b; Gehrmann & 
Naslund, 2005, 2006, 2007). The symmetric key is normally remembered by brain; 
whereas the asymmetric private key is encrypted using another symmetric key. 

ASCII characters have absolute entropy of 6.57 bits per character. Therefore, 
the nominal bit of an ASCII character is 8 bits, but its effective bit is 6.57 bits. To 
cater for the different symmetric key sizes at 80, 96, 112, 128, 192, and 256 bits as in 
Table 2.3, 13, 15, 18, 20, 30, and 39 ASCII characters are needed, respectively. An 
amount of 15 ASCII characters is perhaps still affordable and convenient for the 
human users. However, higher amounts may introduce two problems. 



32 



Memorizability is the main problem. The difficulty to type a long passphrase into a 
computer will be another open problem (Schneier, 1996). 



400 



\ 


1 


Optionally activate the anti-keylogging software. 


\ 


f 



401 



Open the 2D key application software for its input interface: 

(1) Select row and column sizes 

(2) Select to view or hide the secret to be entered 



402 



V 



User enters a secret into the 2D field using one or a combination 
of the secret styles as follows: 

(1) Multiline passphrase 

(2) Crossword 

(3) ASCII graphics/art 

(4) Unicode graphics/art 

(5) Colourful text 

(6) Sensitive input sequence 

(7) Other hybrid combinations 



403 



V 



Further secret processing over the password using the optional 
techniques as follows in sequential order or not in order: 

(1) Key hashing 

(2) Key strengthening 

(3) Multihash key 

(4) Other secret processing techniques over the password like 
generating multiple slave keys from a master key 





1 


Apply the finally generated secret(s) for various applications. 




1 


Clear the memory storing the initial, intermediate, and final 
secrets. Then, close all the application software. 



404 



405 



406 



Figure 4.1 Operation of 2D key input method and system 



33 



Here, a high-entropy key input method called 2-dimensional (2D) key as in 
Figure 4.1 is proposed to solve these problems. 2D key facilitates particularly the 
recognition of reference points of each sub-unit of a passphrase, and generally the 
creation of various secret styles of 2D key like multiline passphrase, crossword, 
ASCII graphics/art, Unicode graphics/art, colourful text, sensitive input sequence, 
and two or more of their hybrid combinations as partially illustrated in Figures 4.3- 
4.6, for Latin language users. 

It uses a 2D display as user interface to improve the human factors of 
memorizability and input of ASCII characters from keyboard. The 2D key has the 
styles of multiline passphrase, crossword, ASCII art, colourful text, or sensitive input 
sequence. It can resist dictionary attack and fulfil the demands of human- 
memorizable key sizes even until 256 bits, which is impossible by using the single - 
line passphrase. 

In addition to fulfilling the various key sizes of symmetric key cryptosystem, 
2D key has novel revolution to the private key storage of asymmetric key 
cryptosystem. For the prior arts, we have encrypted private key, split private key, and 
roaming private key. With the introduction of 2D key, there shall be no more need to 
store the private key in a computing system, but inside the brain as like the 
symmetric key. This allows the creation of memorizable public-key cryptosystem 
(MePKC) as discussed in Chapter 6. MePKC has the special features of mobility, 
lower cost, and higher efficiency. 

4.2 2D Key Input Method 

For single-line passphrase, the numbers of ASCII characters for different 
symmetric key sizes are shown in Table 2.3. An amount of 15 ASCII characters or 
96 bits is a maximum memorizability limit for many human users. This fact is 
statistically proven by Florencio and Herley (2007) in their large-scale study of web 
password habits for half a million users over a 3 -month period, where the average 
key size is 40.54 bits ranging from exclusive to inclusive 100 bits or ]0, 100]. The 



34 



difficulty of user interface to enter a key using keyboard into the single-line key field 
is another big problem. 

The problems of human factor and user interface limit the practical 
application of symmetric key cryptosystem to be at the key size of 96 bits with 10 
years of protection. Using key strengthening, the 96-bit key can be made 19.5 bits 
stronger, and 20-year protection is the maximum theoretical limit. 

The 2-dimensional (2D) key input method is created to allow high-entropy 
keys. Figure 4.2 displays the pseudocode of 2D key input method. It tries to solve the 
human factor of memorizability and user interface of key input. 2D key has a 2- 
dimensional display alike a 2D matrix, where each character of a key is an element 
of the matrix. The key styles drawn in the space of 2D matrix are a mixture of 2D 
text in pictorial form. Thus, 2D key can create big and yet memorizable secret. 



1.0 User selects row size. 
2.0 User selects column size. 

3.0 User enters ASCII characters or Unicode symbols one by one. 
4.0 User ends the key input by pressing the "Enter" key. 
5.0 Computer hashes the input key. 

6.0 Computer compares the hashed key with the stored hash. 

6.1 If the hashes match, authentication is verified. 

6.2 If the hashes mismatch, authentication is rejected. 

Figure 4.2 Pseudocode of 2D key input method and system 

The font used for 2D key has to be fixed-width font. Fixed-width font is also 
called non-proportional font and monospaced font. It is a typeface using fixed width 
for every glyph. Examples of fixed-width fonts are Courier for ASCII and MS 
Mincho for Unicode. When ASCII encoding is used, the 2D key has 6.57 bits per 
character. Meanwhile, when Unicode is used, it has 16 bits per character. Even 
though Unicode-based 2D key has higher entropy, it is inconvenient to enter a 
Unicode symbol for the mean time, and the fixed-width font for all the Unicode 
symbols has not yet been created. Hence, ASCII-based fixed-width font is used 
currently for the discussions as well as prototype demonstration. 



35 



To use 2D key input method and system, firstly a user needs to select the row 
size and column size of the 2D matrix for 2D key. The currently built prototype has a 
maximum row size or height of 10 characters, and a maximum column size or width 
of 13 characters. The column size is set at 13 due to the Chinese-character-encoded 
passphrase (Lee, 2009a) has a maximum size of 13 per Chinese character. 
Alternatively, it can be a word in English language or other languages that has a size 
of 13 characters per word with character stuffing. 

The input styles of 2D key are multiline passphrase, crossword, ASCII art, 
Unicode art, colourful text, and sensitive input sequence. Multiline passphrase, 
crossword, and ASCII art are currently implemented in the prototype; whereas 
Unicode art, colourful text, and sensitive input sequence require additional supports. 

After selecting the row size and column size, the user can input ASCII 
characters using keyboard as the elements of the 2D matrix. The input characters can 
have any style or a mixed style of 2D key. These styles have good memorizability, 
and the 2D nature of 2D key generates more references at the user interface for key 
input. Single-line key field has only one reference at the first location of the only line. 
2D key has a number of horizontal lines and each first location of the horizontal lines 
acts as references for key input. In addition, the first locations of the vertical lines 
can be secondary set of references for key input. This solves the location recognition 
problem of user interface in facilitating a user to enter a high-entropy key by having 
more indexed references. 

Good memorizability allows a user to repeat a high-entropy key. The 
elements of 2D matrix can be either partially, fully, or extraordinary filled. To fill 
extraordinarily means adding some extra trailing characters as noise (Lee, 2009a) 
after the last element of the 2D matrix. The characters entered into the 2D key field 
are read by a computer line by line horizontally from top to bottom, hashed, and 
processed as usual alike the single-line key field. The hashing process is one round if 
key strengthening is not used. If key strengthening is used, the hashing iteration is set 
according to the computer response time per access ranging from 0.05 to 1 second, or 
any other tolerable ranges. 



36 



4.3 Styles of 2D Key: Multiline Passphrase 

For single-line key field, it is hard to input a high-entropy single-line 
passphrase due to the problem of user interface. A user may lose the reference of 
starting character of a word in a passphrase. Using 2D key, multiline passphrase can 
be input, where each line consists of one word of a passphrase. Each word is padded 
to the longest word in the passphrase. The padding character can be any ASCII 
character and acts as a text-based semantic noise (Lee, 2009a). Figure 4.3 shows a 
2D key example using multiline passphrase. Its dimensions are 4x5, and uses 
character as the padding character. This 2D key has absolute entropy of 131 bits. 



Have* 
^ * ^ 
happy 
day ! * 

Figure 4.3 Styles of 2D key: Multiline passphrase 



HAPPY* 
0*R*K* 
ェ NCH 

SPELLS 



WELCOME 
TO: : : : 
:USE: : 
: : :2D: 
: : :KEY 



Figure 4.4 Styles of 2D key: Crossword 



4.4 Styles of 2D Key: Crossword 

The second style of 2D key is crossword. Instead of horizontal and vertical 
multiline passphrase, a user can enter a mixture of horizontal, vertical, and slanted 
passphrases. Figure 4.4 shows two 2D key examples using crossword. Their 
dimensions are 5 x 6 (left) and 5x7 (right), and use characters '*, and ':,, 
respectively, as the background character. These 2D key have absolute entropy or 
key size of 197 and 229 bits, respectively. 



4.5 Styles of 2D Key: ASCII Art / Unicode Art 



37 



The third style of 2D key is ASCII art or Unicode art. ASCII art is a graphical 
presentation of computer using the 95 printable ASCII characters. Unicode is a 
variant of ASCII art, where instead of using ASCII characters, Unicode symbols are 
used to create artistic graphics. 



111111 



111111 
—11 — — 
—— 11 —— 
—— 11 —— 
111111 
111111 



222222 






2D2DDD 






2D2D2D 






2D2D2D 






2D2DDD 







Figure 4.5 Styles of 2D key: ASCII art 

Figure 4.5 displays three 2D key examples using ASCII art. For the left 
example, ASCII characters T and are used to display a Chinese character 
meaning "engineering". Its dimensions are 7 x 6 with key size of 275 bits. For the 
middle example, ASCII characters '2' and 'D' are used to display a digit '10' with 
background character '2,. Its dimensions are 5 x 6 with key size of 197 bits. For the 
right example, ASCII characters T and are used to display a Chinese character 
meaning "centre" with background character Its dimensions are 5 x 6 with key 
size of 197 bits. 

Figure 4.6 shows a 2D key example using Unicode art. Unicode symbols '¥' 
and are used to display a Chinese character meaning "engineering" again. 
Unicode is entered using the keyboard by pressing the keys "0165" while holding 
the key of 'Alt'. Unicode is entered using the keyboard by pressing the keys 
"0169" while holding the key of 'Alt'. Once the 'Alt' key is released, the Unicode 
symbol is entered. Its dimensions are 4 x 5. This 2D key has key size of 320 bits. 



¥¥¥¥¥ 
©©¥©© 
©©¥©© 
¥¥¥¥¥ 

Figure 4.6 Styles of 2D key: Unicode art 



38 



4.6 Styles of 2D Key: Colourful Text 

The style of this 2D key needs some additional supports. Colour encoding, 
special graphical user interface, and special computer processing are required. 
Although these supports make the user interface complicated for the computer, they 
can be implemented and have better memorizability for the human users. Colour is 
definitely a main element of good memorizability. For example, by having 16 types 
of colours, every character in the 2D key will have an additional 4 bits. ASCII-based 
2D key will become 10.57 bits per character; whereas Unicode-based 2D key is 
20.59 bits per character. The entropies per character of ASCII-based and Unicode- 
based 2D keys will be increased by 60.9% and 24.1%, respectively. The additional 
colour secret also carries more randomness to resist dictionary attack. 

4.7 Styles of 2D Key: Sensitive Input Sequence 

For the secret style of sensitive input sequence, it is an additional feature over 
the current 2D secret style where there is added entropy from the input sequence of a 
character to a specific element location of the 2D matrix. If a 2D key has the 
dimensions of m x n, the key space is increased by [(m ^ n)!]. If a 2D key of 4 x 5 as 
in Figure 4.3 is used, the key space is increased by [20!] or 61.1 bits from 131.40 bits 
to 192.47 bits, which is close to the left example in Figure 4.4 for the 2D key of 
dimensions 5x6 with 197.10 bits. 

This key style requires the space encoding for the element location of 2D 
matrix, table-like graphical user interface ofmxn matrix, and human memory for 
the sequence of characters. In term of memorizability, there is not much 
improvement. However, the time to enter a 2D key of similar size is greatly reduced 
for the same amount of key size. 

4.8 Requirement of Key Size for 2D Key 

Table 4.1 shows the setting sufficiency of various dimensions of 2D key as 
compared with ASCII-based and Unicode-based passwords for various key sizes. 



39 



Based on enough key size by using 2D key, different levels of security strength for 
symmetric key cryptosystem like AES-128, AES-192, and AES-256 can be 
practically realized. For fully mnemonic private key, maximally easily achievable 
MePKC is FFC-256 and ECC-256. For 512-bit MePKC, more conditions for 2D key 
are needed, in which it may restrain to a specially trained human group. 



Table 4.1 Various key sizes corresponding to the numbers of ASCII characters, 
Unicode (version 5.0) characters, and settings sufficiency of 2D key input method 



Key size (bit) 


80 


96 


112 


128 


160 


192 


256 


384 


512 


Number of ASCII character (6.57 bits) 


13 


15 


18 


20 


25 


30 


39 


59 


78 


Number of Unicode character (16.59 bits) 




6 


7 


8 


10 


12 


16 


24 


31 


ASCII-based (4 * 5) 2D key (131.4 bits) 


Yes 


Yes 


Yes 


Yes 


No 


No 


No 


No 


No 


ASCII-based (5 * 6) 2D key (197.1 bits) 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


No 


No 


No 


ASCII-based (7 * 6) 2D key (275.9 bits) 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


No 


No 


Unicode-based (5 * 5) 2D key (414.8 bits) 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


No 



40 



CHAPTER 5 RESEARCH METHODOLOGY (PART 2): 
MULTIHASH KEY 



5.1 Overview 

A human's e-life needs multiple offline and online accounts. It is a balance 
between usability and security to set keys or passwords for these multiple accounts. 
Password reuse has to be avoided due to the domino effect of malicious 
administrators and crackers. However, human memorizability constrains the number 
of keys. Single sign-on server, key hashing, key strengthening, and petname system 
are used in the prior arts to use only one key for multiple online accounts. The unique 
slave keys (aka site keys) are derived from the common master secret and specific 
domain name. These methods cannot be applied to offline accounts such as file 
encryption. New method and system are invented to be applicable to offline and 
online accounts. It does not depend on http server and domain name, but numeric 4- 
digit passcode, key hashing, key strengthening, and hash truncation. Domain name is 
only needed to resist spoofing and phishing attacks of online accounts. 

5.2 Introduction 

There are lots of situations that require a user to have many online and offline 
accounts. Examples of online and offline accounts are login access and file 
encryption, respectively. For safer security, a secret cannot be re-used to avoid 
password domino cracking effect (Ives, Walsh, & Schneider, 2004), where an 
attacker starts the password cracking process from the weakest link. However, 
according to R. Kanaley (2001), an Internet user manages an average 15 keys on a 
daily basis. Yet in another survey by Adams and Sasse (1999), a user can only be 
expected to handle 4 to 5 unrelated and regularly used keys. For user's unique keys 
without the constraint of relevancy, Florencio and Herley's survey (2007) reported 
an average 6.5 keys, repeated 3.9 times each for 25 accounts and typing 8 keys daily. 
Hence, there is a memory burden to the user unless these secrets are written down 



41 



somewhere. However, important password the secret is discouraged to be jotted 
down somewhere. 

5.3 Basic Model of Multihash Key 

The proposal here requires users to remember an at least 128-bit master key 
and a numeric 4-digit passcode. The master key can be derived from creation 
methods of big memorizable secret (Lee, 2008h, 2008k, 20081, 2009a, 2010b, 2010c), 
like 2D key. This method and system is named "multihash key". 

The passcode is used together with key hashing, key strengthening (Manber, 
1996; Abadi, Lomas, & Needham, 1997; Abadi, Needham, & Lomas, 2000; Kelsey, 
Schneier, Hall, & Wagner, 1997) and hash truncation to generate exemplary 20 
unique hashes at 20 security levels for 20 accounts. Each security level has 1 account. 
These hashes are site keys. All the security levels are ranked from the highest 
security (#1) to the lowest security (#20). This is because knowing the multihash key 
at the higher level can reveal the multihash key at the lower level, but not the reverse, 
through partial brute-force attack via guessing. 

From Kanaley's survey (2001), 20 accounts are set since an active Internet 
user manages an average of 15 keys daily. Five accounts are added by assuming that 
there are five offline accounts. The number of accounts can be increased by changing 
the settings or remembering another pair of (master key, passcode). 

There are three pseudo-codes for multihash key to show how the method and 
system work: Determination of hash iterations of multiple security levels, generation 
of multihashes as site keys, and changes of key pair (master key, passcode). 

As an example, Figure 5.1 shows the determination of 20 security levels via 
the experiments to locate the lower bound b L and upper bound bu for 1 -second hash 
iterations for an old computer that is slow but still popular in early years of 2000 AD. 
Each security level is partitioned by 2 s . 

Figure 5.2 presents the basic model of multihash key to generate multihashes 
as site keys. A user needs to remember the selected security level for a specific 
account. In case of forgetfulness, all the 20 security levels shall be tried one by one. 



42 



1400 

V 

Settings to determine the lower and upper bounds of 1 -second hash iteration 

(1) b L = lower bound for 1 -second hash iteration 

(2) b H = upper bound for 1 -second hash iteration 

(3) Si = security level (i = 1, 2, 3, ..., x), where x = 20, 32, or other values 

(4) si = highest security level, s x = lowest security level 

V 

Determination of bound b t for each security level s t is as follows: 

(1) bi < 一 0.2b L + 2 8 X (i - 1), b t < 2.0b K ^ 

(2) /ᅳ/-1 

(3) If i = 0, exit; else go to step 1 of Box 1402 again. 



Figure 5.1 Pseudo-code to determine the numbers of hash iteration for multiple 
security levels of multihash key methods and systems 

Necessary entries are master key d and numeric 4-digit passcode d N . Optional 
entries are username ID and website (or domain name) URL. The username and 
website are used to create diversity of multihash key from a key pair (master key, 
passcode). Domain name can also help to resist phishing and spoofing attacks. 

The 512-bit hash of the concatenated master key and passcode is truncated 
into 20 partitions with 8-bit each from the MSB bit. This increases the randomness of 
specific keys for different accounts. If an attacker does not know the exact security 
level, then 5120 (= 2 8 * 20) hashes have to be checked for any key pair (master key, 
passcode). If the attacker knows about the security level, then 2 8 hashes have to be 
validated for any key pair (master key, passcode). 

For the settings of bound bu it can be either fixed or random. If the fixed 
option is chosen, the number of hash iterations will use the standard settings. A user 
is mobile and can use this method without remembering the number of hash 
iterations while accessing offline and online login account from different computing 
systems. 



〜應 



43 



1500 

V 

Settings to create various slave keys d s (aka site keys) of multihash key: 

(1) Necessary entries: Master key d, numeric y-digit passcode d n where y can be 4 

(2) Optional entries: Username ID, domain name URL, or else NULL 

(3) Bounds of hash iteration for various security levels s; : b\, b 2 , b 3 , . -., み;, ...,b x 

(4) User selects security level s t among x security levels, where x = 32 or others 

(5) Use 2n-bH hash function where In > 512 like SHA-512 



V 

Processing the master key d and passcode d n to create the determinants H h of hash 
iteration number for each security level within their bounds: 

(1) H b SHA-512 (d II d n , 1) for one round of hash iteration 

(2) H h (z\ , Z2) = bit truncation of H h from Dit z\ to bit z 2 



Nj/ 

Calculate the hash iteration number j of a slave key: 

(1) Choose either Fixed or Random j 

(2) if Fixed 

if/=l, j ^ (^i-2 8 +l) + H b (0 , 7), j<b { - 

else if 1 </<x,j^- (b^+l) + H h (8i-8 , 8/-1), j < b t ; 
else if i = x, j ᅳ 외 +1) + H h (8x-S , 8x-l), j<b x . 
else if Random 

j <— random[b 1-2^+1 , b x ] , where human remembers a random value 



V 

Generate slave key d s : 

(1) Do if ID = URL = NULL, //, ^- SHA-512(J ,7) ; 

else if ID = NULL, //, ― SHA-512(J II URL , f) ; 
else if URL = NULL, H t ト SHA-512(J II ID J) ; 
else if ID and URL are not NULL, //, ト SHA-512(J II ID II URL J). 

(2) H <- Hi(0 , 255), n-bit truncation of H t from MSB bit, where n = 256 

(3) d s < 一 Bin2Txt( «-bit CSPRBG (H) ), Bin2Txt = Binary-to-text encoding 



\レ 

Apply the slave key d s . Then, clear the memory storing all forms 
of secrets and close all the application software. 



Figure 5.2 Operation of the basic model of multihash key method and system 



44 



〜蒲 



〜蒲 



세 504 



예 505 



If the random option is chosen, the number of hash iterations will be 
randomly selected by a user within a given range. User's mobility is weakened 
unless one can remember the random values of hash iterations while accessing 
offline and online logins. However, if a user can remember the hash iterations, this 
option offers stronger resistance to dictionary attack. The best option is a hybrid 
scheme. Choose fixed option for lower security levels and random option for higher 
security levels. 

Depending on the value existence of username ID and domain URL, the 
master key undergoes different key hashing and key strengthening using SHA-512 to 
generate hash Hi. Hi is then encoded from binary to text to fulfil the demands of 
password requirements such as alphanumeric, mixed lowercase and uppercase, and 
with punctuation marks. 



Table 5.1 Binary-to-text encoding Bin2Txt(H) of multihash key 



Bin 


00 


01 


02 


03 


04 


05 


06 


07 


08 


09 


10 


11 


12 


13 


14 


15 


Txt 


a 


b 


c 


d 


e 


f 


g 


h 


i 


j 


k 


1 


m 


n 





P 


Bin 


16 


17 


18 


19 


20 


21 


22 


23 


24 


25 


26 


27 


28 


29 


30 


31 


Txt 


A 


B 


C 


D 


E 


F 


G 


H 


I 


J 


K 


L 


M 


N 


O 


P 


Bin 


32 


33 


34 


35 


36 


37 


38 


39 


40 


41 


42 


43 


44 


45 


46 


47 


Txt 





1 


2 


3 


4 




6 


7 


8 


9 






< 




> 


? 


Bin 


48 


49 


50 


51 


52 


53 


54 


55 


56 


57 


58 


59 


60 


61 


62 


63 


Txt 


! 




# 


$ 


% 


& 




( 


) 


* 


+ 








1 


@ 


Bin 


Padding 






























Txt 

































N.B.: Bin: For easy understanding, decimal value is shown to represent binary values 



Here, a binary- to -text encoding of Bin2Txt(H) is proposed as in Table 5.1. 
Base64 encoding is not used as there are only two punctuation marks included 
(Borenstein & Freed, 1992). Bin2Txt(H) converts 6 binary bits into one 8-bit ASCII 



45 



character. It has a bit expansion of 33%. All types of ASCII characters are included: 
lowercase, uppercase, digit, and punctuation marks. The last group of 4 binary bits of 
H from 253rd to 256th is padded with 2 binary bits of at the right or LSB side. The 
output of Bin2Txt(H) is a string of 43 ASCII characters and is used as key hash. 

Lastly, copy the hash as site key into the clipboard and paste it on the prompt 
key field for authentication access. Remember to clear the clipboard before 
leaving the computer. 

On how to change from an old key into a new one, a user can change either 
the master key, passcode, security level, username, or the domain name. There are 
also proposed usages of 20 security levels as shown in Figure 5.3. 



Security levels: usages 

1 Password file and key management tool like password vault. 

2 Finance =〉 Very important Internet banking. 

3 Finance => Important Internet banking. 

4 Finance =〉 Stock trading. 

5 Finance =〉 Insurance, income tax, ... 

6 Very important personal encrypted files, email accounts, instant messengers, ... 

7 Important personal encrypted files, email accounts, instant messengers, ... 

8 Very important accounts in working/studying place like email. 

9 Important accounts in working/studying place like database. 

10 Other accounts in working/studying place like library. 

11 〜: 20 Other not frequently used offline and online accounts. 

Figure 5.3 Proposed usages of 20 security levels 

New methods and systems called multihash key and its variants are presented 
here to generate multiple slave keys (aka site keys) from a single master key for both 
the offline and online accounts. Among various cryptographic, information-hiding, 
and non-cryptographic applications needing secrets for various types of key, here are 
some of the popular applications of secret key: (i) Master key for password vault 
hiding various keys; (ii) Internet banking; 사 m) online stock trading; (iv) insurance; (v) 
tax; (vi) office, school and home email accounts; (vii) instant messengers; (vm ; 
encrypted files; (ix) database accounts at the office and school; (x) library accounts; 
and (xi) verification key for credit card. Hence, the impact contribution of multihash 



46 



key shall be very high in the aspects of reducing the human memorization burden 
and system operating costs. 

5.4 Acceptable Time Bounds of Multihash Key 

The multihash key method and system uses the hash iteration and hash 
truncation, followed by optional n-bit CSPRBG to increase the randomness, as for a 
basic model of multihash key as in Figure 5.2, to generate slaves keys from a master 
key and an optional passcode. The master key and hash function shall be at least 2n 
bits. The passcode shall be at least 4 digits or more. The hash iteration applies the 
key strengthening for a period ranging from 0.2 to 2 seconds, or longer to 10 seconds 
in some of the variants of multihash key. Hash truncation halves the hash value or 
message digest. Multihash key supports infinite number of online accounts and 
limited number of offline accounts depending on the performance of the computer. 
Examples of online accounts are webmail, login, email, and instant messenger. 
Examples of offline accounts are encrypted file, public-key certificate, bank ATM 
card, and software token. 

For the present and future times, and in view of the needed number of secret 
keys for possible amount of offline and online accounts, computer systems with 
faster processing speed are needed as enabling technologies to accommodate more 
slave keys of multihash key within the acceptable time bounds. 



47 



CHAPTER 6 RESEARCH METHODOLOGY (PART 3): 
APPLICATIONS OF BIG MEMORIZABLE 
SECRET & MePKC 

6.1 Methods and Systems to Create Big Memorizable Secret 

Accordingly, the present invention mainly provides a method to create big 
memorizable master secret using 2D key, followed by another method to derive 
multiple slave keys for offline/online accounts from the master key. Every key style 
of 2D key input method and system can be used individually or mixed as a hybrid 
combination. The size of big memorizable secret is at least 128 bits. Figure 6.1 
illustrates the main and basic operations for the generations and applications of one 
or more big memorizable secret(s). 

6.2 Potential Applications of Available Big Memorizable Secret 

With the realization of big memorizable secret, not only the big secret keys of 
symmetric key cryptosystems of higher security strength like AES-192 and AES-256 
can be realized firstly, but memorizable public -key cryptosystem (MePKC) secondly, 
and other cryptographic, information-hiding, and non-cryptographic applications 
thirdly, in the information engineering field that need big and yet memorizable secret. 

These cryptographic applications include cryptographic schemes like 
encryption, signature, key exchange, authentication, blind signature, multisignature, 
group-oriented signature, undeniable signature, threshold signature, fail- stop 
signature, group signature, proxy signature, signcryption, forward-secure signature, 
designated-verifier signature, public-key certificate (aka digital certificate), digital 
timestamping, copy protection, software licensing, digital cheque (aka electronic 
cheque), electronic cash, electronic voting, BAP (Byzantine Agreement Protocol), 
electronic commerce, MAC (Message Authentication Code), key escrow, online 
verification of credit card, multihash signature (Lee, 2009), etc. 



48 



100 



Y 

User selects one or a mixture of the key styles of 2D key input 
method as follows to create one or more big memorizable secrets 
in a computing device: 

(1) Create two-dimensional key (2D key): ASCII encoding, 
Unicode encoding. 

(2) Use multihash key to create slave keys from the previously 
created 2D key as master key. 




101 



102 



The created secret is used as password, passcode (aka pin), symmetric key, 
asymmetric private key, stego-key, symmetric watermarking key, asymmetric 
watermarking private key, PRNG seed, etc., for one or a mixed combination of the 
systems as follows in the field of information engineering: 

(1) Cryptographic applications like 256-bit AES, DSA, ECC, MePKC 

(2) Information-hiding applications like steganography, watermarking 

(3) Non-cryptographic applications like PRNG, CSPRBG 



Perform one of the many functions as follows: 

(1) Creating an asymmetric public key using an asymmetric private key 

(2) Encrypting using a symmetric key, stego-key, asymmetric public key 

(3) Decrypting using a symmetric key, stego-key, asymmetric private key 

(4) Signing using an asymmetric private key 

(5) Embedding using a symmetric watermarking (WM) key, asymmetric WM private key 

(6) Verifying using a symmetric watermarking key 

(7) Creating an HMAC (Keyed-Hash Message Authentication Code) using a secret key 

(8) Seeding PRNG, CSPRBG 

(9) Other functions using secret(s) 



After finishing the process using the secret, do either one of the 
processes as follows before the application is closed: 

(1) Delete the secret immediately during or after the application 

(2) Store the secret for limited time 

(3) Store the secret for limited amount of usages 

(4) Store the secret for limited amount of usages per unit of time 



104 



Figure 6.1 Generations and applications of one/more big memorizable secrets 



49 



Those information-hiding applications include steganographic and 
watermarking schemes like stego-key in steganography, secret key in symmetric 
watermarking, private key in asymmetric watermarking, etc. Meanwhile, the non- 
cryptographic applications are PRNG (Pseudo-Random Number Generator) and 
CSPRBG (Cryptographically Secure Pseudo-Random Bit Generator). Hence, there 
exist lots of needs to have big memorizable secret for lots of cryptographic, 
information-hiding, and non-cryptographic applications in the field of information 
engineering, generally, and information security engineering, particularly. 

6.3 Main Applications for Symmetric and Asymmetric Key Cryptosystems 

With the emergence of 2D key having the styles of mutliline passphrase, 
crossword, ASCII art I Unicode art, colourful text, and sensitive input sequence, 
high-entropy key as high as 256 bits is possible. We can now overcome the human 
factor of memorizability and user interface problem of single-line key field, which 
have limited the key size to 96 bits or about 100 bits. 

Table 6.1 shows the possible dimensions of ASCII-based 2D key for various 
key sizes of symmetric key cryptosystem. Key strengthening can boost up another 
19.5 bits. If Unicode-based 2D key is used, the dimensions of 2D key can be greatly 
reduced. From Tables 2.3 and 4.1, the settings sufficiency of 2D key input method 
and system for various key sizes is shown. It can be observed that larger key sizes 
than 128 bits for cryptographic, information-hiding, and non-cryptographic 
applications like AES-128, AES-192, AES-256, ECC-256, etc., can be realized by 
using the 2D key, especially the MePKC using fully memorizable private key. 



Table 6.1 Dimensions of 2D key for various symmetric key sizes 



Symmetric key size (bits) 


80 


96 


112 


128 


192 


256 


Number of ASCII characters 


13 


15 


18 


20 


30 


39 


Dimensions of 2D key (ASCII) 


3x5 


3x5 


3x6 


4x5 


5x6 


5x8 



For asymmetric key cryptosystem, memorizable public-key cryptosystem 
(MePKC) can be created. This is possible by using the FFC and ECC with minimum 



50 



size of private key at 160 bits. The private key of MePKc is stored in the human 
brain, and not stored as encrypted, split, and roaming private keys as in the prior arts. 
This provides mobility, lower cost, higher efficiency, and resistance to dictionary 
attack and pre-computation attack. 

Assuming that the maximum memorizable key size is 256 bits, 256-bit 
MePKC using FFC and ECC with 128-bit security strength can be realized. It has a 
protection period of 30 years. If key strengthening is used, 19.5 bits is added, or an 
increase of 10-bit security, which extends the protection to 50 years. This is very 
much enough for many practical applications. 

A software prototype of this 2D key (Lee, 2006a, 2008i, 2009c, 2010a) with 
the function of multihash key (Lee, 2007a) has been built up by using the Microsoft 
Visual Studio (Marshall, 2003). The 2D key can have optional anti-keylogging 
application software (Log This, No date; McNamara, 2003, pp. 197-202) to achieve 
higher security during the input. To get a copy of this software, please visit [URL: 
www.xpreeli.com] . 

There are other potential applications of 2D key method and system. Firstly, 
2D key can be specialized to include only numeric digits or other sets of limitedly 
encoded characters for devices with limited space like the display and key pad of a 
bank ATM machine and computerized safety box. Secondly, the display of 2D key 
can be an LCD display or other display technologies integrated with a computer 
keyboard having a first partial 2D key optionally visible and a second partial ID key 
in hidden mode only to better resist the shoulder-surfing attack. 

6.4 Prototyped Applications of Created Big Memorizable Secret(s) 

For useful applications of the created big memorizable secret (s) and MePKC, 
the prototyped applications in software form, that have been built for experimental 
testing by Kok-Wah Lee the author, include: 

(i) method and system to realize memorizable symmetric key the secret till 
resistance to quantum computer attack; 



51 



(ii) method and system to realize encryption scheme of memorizable public- 
key cryptography (MePKC); and 

(iii) method and system to realize signature scheme of memorizable public- 
key cryptography (MePKC). 

6.5 Memorizable Symmetric Key to Resist Quantum Computer Attack 

Due to the successful cracking of 56-bit DES (Data Encryption Standard) in 
the 1990s, stronger symmetric ciphers with larger symmetric key sizes like 80-bit 
2TDES, 112-bit 3TDES, as well as 128-, 192-, and 256-bit AES (developed from 
Rijndael cipher) are introduced to replace the DES. 

Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson and Wiener (1996) 
discussed the minimal key lengths for symmetric ciphers. The NIST (National 
Institute of Standards and Technology), USA, proposes different protection periods 
for security through years 2010, 2030, and beyond 2030, for 80, 112, and 128 bits, 
respectively (E. Barker, W. Barker, Burr, Polk, & Smid, 2007a, 2007b). ECRYPT of 
European Union (EU) proposes in its technical reports that 80-, 96-, 112-, 128-, and 
256-bit security have protection periods of 4 years through year 2010, 10, 20, 30 
years, and foreseeable future to be against quantum computer attack, respectively 
(Gehrmann & Naslund, 2005, 2006, 2007). Nevertheless, conventional methods and 
systems normally can only realize a key size of 128 bits or less. 

Hence, the first application in Section 6.4(i) of the present invention in 
applying the created big memorizable secret is to realize higher security levels of 
symmetric ciphers like AES- 192 and AES-256. By using the 2D key input method 
and multihash key as in Figure 6.1 and Table 4.1, it can be observed that the current 
highest security level of symmetric cipher at 256 bits can be practically realized and 
achieved using big memorizable 256-bit secret. 

Prototypes of application software have been built to experimentally test the 
applications of big memorizable secret using 2D key and multihash key for 
symmetric key cryptosystem like AES-128, AES-192, and AES-256. 



52 



6.6 Memorizable Public-Key Cryptography (MePKC) 

6,6,1 The Proposed MePKC Applications 6.4(H) 國 (iii) 

The second and third applications 6.4(ii)-(iii) of the present invention in 
applying the created big memorizable secret are to improve from the token-based 
public-key cryptography (PKC) to the realization of secret-based PKC using fully 
memorizable private key, which is named as MePKC (Memorizable Public-Key 
Cryptography) or MoPKC (Mobile Public-Key Cryptography) here. The main 
advantages of MePKC are full secret memorizability and mobility convenience. Yet 
another quite important advantage is that secret-based MePKC can resist some side- 
channel attacks vulnerable to token-based PKC, such as those attacks over the fully 
or partially encrypted private key. For illustration of MePKC, please refer to Figure 
6.2. 

The current lowest key size requirement of asymmetric private key is 160 bits 
operating in FFC and ECC. From Table 4.1 listing the dimensions of proposed novel 
2D key input method and system to create big memorizable secret, a 160-bit secret 
for 160-bit fully memorizable private key can be supported by a rather small 2D key 
space. This group of big memorizable secret creation method and system can easily 
support memorizable private key up to 256 bits at the symmetric bits of security 
strength of 128 bits and for a protection period of 30 years. 

For higher security levels up to 512-bit secret used by 512-bit MePKC, multi- 
factor multimedia key using software token (Lee, 2008h, 20081, 2009a) has to be 
adopted to halve the key size requirement towards a practical realization. Here, the 
mobility convenience is somehow sacrificed. 

The MePKC can be used for major PKC cryptographic applications like 
encryption and digital signature schemes. Other minor applied cryptographic 
schemes are key exchange, authentication, blind signature, multisignature, group- 
oriented signature, undeniable signature, threshold signature, fail-stop signature, 
group signature, proxy signature, signcryption, forward-secure signature, designated- 
verifier signature, public-key certificate (digital certificate), digital timestamping, 
copy protection, software licensing, digital cheque (aka electronic cheque), electronic 
cash, electronic voting, BAP (Byzantine Agreement Protocol), electronic commerce, 



53 



MAC (Message Authentication Code), key escrow, online verification of credit card, 
multihash signature (Lee, 2009), etc. 



1300 



Optionally activate the anti-keylogging software. 



\レ 



Open the MePKC application software operating on at least 160- 
bit ECC (Elliptic Curve Cryptography) for its input interface. 



1301 



1302 



User creates an n-bit secret S like 256 oits using one or more methods as follows: 

(1) ASCII-based 2D key 

(2) Unicode-based 2D key 

(3) Conventional secret creation methods and other future methods 

- Next send secret S to Box 404 in Figure 4.1 for secret processing, like multihash 
key. 



1303 



User creates an asymmetric key pair as follows: 

(1) Let Kp te = private key, Kp Ub = public key 

(2) Kp te Box 404 (S), optional secret processing of memorizable secret S 

(3) K pub Public Key Generation (K pte ) 

(4) Store the Kp Ub and clear Kp te in the computer memory 

(5) Create public key certificate (aka digital certificate) from K pub using certificate 
authority or introducer of web of trust 

(6) Optionally publish and/or send the public key certificate to other PKC users 



1304 



Apply the asymmetric key pair and public key certificate for 
various MePKC applications like encryption, signature, etc. 



1305 



Clear the memory storing all forms of secrets. Then, close all the 
application software. 



1306 



Figure 6.2 Operation or MePKC method and system 



54 



The blind signature scheme includes its further applications for electronic 
cash (aka e-cash, electronic money, e-money, electronic currency, e-currency, digital 
cash, digital money, digital currency, or scrip), and electronic voting (aka e-voting, 
electronic election, e-election, electronic poll, e-poll, digital voting, digital election, 
or digital poll). 

Advancement of computing technologies requests for longer key sizes for a 
fixed protection period. To freeze this unwanted request, key strengthening (aka key 
stretching) through many rounds of hash iteration, together with hash truncation and 
a hash function with longer hash value like 768, 1024 bits or more, can be used. 

MePKC was extended by Lee (2008h, 20081, 2009a) there to other novel 
claimed inventions called multihash signature scheme, and novel innovations of 
some cryptographic schemes like digital cheque, software licensing, human- 
computer and human-human authentication via a computer communication network, 
as well as MePKC digital certificate with multiple public keys for password 
throttling and ladder authentication. 

These MePKC applications are best to be implemented using the ECC 
(Silverman, 1986; Blake, Seroussi, & Smart, 1999, 2005; Hankerson, Menezes, & 
Vanstone, 2004, 2005; Zhu & Zhang, 2006). This is because ECC needs a minimum 
private key size of 160 bits and it has been long time tested for its security strength. 
Alternatively, depending on further research and evaluation, shorter private key size 
at equivalent or better bits of security strength can be achieved by using hyperelliptic 
curve cryptography (HECC) (Pelzl, Wollinger, & Paar, 2004; Cohen & Frey, 2006; 
Wang & Pei, 2006) and possibly other cryptosystems like torus-based cryptography 
(TBC) (Rubin & Silverberg, 2003). 

For HECC, the genera 2 and 3 have so far been tested to have shorter key size 
requirement than ECC by twice and thrice. Between them, genus-2 HECC has a 
higher security without the demand to have a correction factor for its key size. In 
other words, the correction factor of HECC of genus 2 is 1. As information, genus-3 
and genus-4 HECC have a correction factor of 1.05 and 1.286 times of its field, 
respectively, for the key size to get a larger group order at equivalent bits of security 
strength. For more information, please refer to an article entitled "High Performance 



55 



Arithmetic for Special Hyperelliptic Curve Cryptosystems of Genus Two" by Jan 
Pelzl, Thomas Wollinger, and Christof Paar (2004). 



6.6.2 Selection of ECC Curve to Prototype MePKC Schemes 

For second applications 6.4(ii), prototype of application software has been 
built to experimentally test an example of encryption scheme of MePKC, i.e. 192-bit 
ECC, by using a software package called Microsoft Visual Studio .NET 2003 
(Academic Edition). 

For the settings of the 192-bit ECC, a 192-bit pseudo-random curve over 
prime field (P-192) (NIST, 2006c) has been selected as in Equation (6.1), following 
paragraphs for parameter definition and initialization, in which it is suitable for both 
the built prototypes of MePKC encryption scheme and MePKC signature scheme. 

y 2 = X 3 + ax + b (mod p) (6.1) 

To define the parameters of ECC curve P-192 (NIST, 2006c; Hankerson, 
Menezes, & Vanstone, 2004, 2005), we have: 

- the prime modulus p 

- the order n 

- the N-bit input seed S to SHA-512 based algorithm, like N = 160, 512 

- the output c of the SHA-512 based algorithm 

- the coefficient a 

- the coefficient b (satisfying cb 2 = a 3 (mod p)) 

- the cofactor h 

- the base point x coordinate G x of point G(G X , G y ) 

- the base point y coordinate G y of point G(G X , G y ) 



56 



The integers p and r are given in decimal and hex forms; bit strings and field 
elements are given in hex form. To initialize the parameters of ECC curve P-192 
(NIST, 2006c; Hankerson, Menezes, & Vanstone, 2004, 2005), we have: 

P-192: p = 2 192 — 2 64 — 1, a = -3i , h = 1 10 

p= 6277101735386680763835789423207666416083908700390324961279 10 

n= 6277101735386680763835789423176059013767194773182842284081k) 

n = Ox ffffffff ffffffff ffffffff 99def836 146bc9bl b4d22831 

S = Ox 3045ae6fc8422f64 ed579528 d38120ea el2196d5 

c = Ox 3099d2bb bfcb2538 542dcd5f b078b6ef 5f3d6fe2 c745de65 

b = Ox 64210519 e59c80e7 0fa7e9ab 72243049 feb8deec cl46b9bl 

G x = Ox 188da80e b03090f6 7cbf20eb 43al8800 f4ffflafd 82ffl012 

G y = Ox 07192b95 ffc8da78 63101 led 6b24cdd5 73f977al le794811 

6.6.3 Encryption Scheme of MePKC 

Using a simple ECC encryption scheme (Stallings, 2006), we firstly define 
parameter as follows: 

k A = user A's private key from a 192-bit secret, where < k A < n 

P A = user A's public key 

k B = user B's private key from a 192-bit secret, where < k B < n 

Pb = user B's public key 

z = 192-bit random number, where < z < n 

Pz(Pzx , Pz y ) = point of random number z, satisfying P z = zG (mod p) 
Pd(Pdx , PDy) = point of random number z, satisfying P D = zP B (mod p) 
E = plaintext of 192-bit symmetric key, where < E < p 
F = ciphertext of 192-bit symmetric key 
M = plaintext of message 



57 



C = ciphertext of message 



To encrypt a plaintext of message M, we then use a hybrid encryption system 
of symmetric key cryptosystem and asymmetric key cryptosystem. This is because 
the latter system is 1000 times slower than the former system. Asymmetric key is 
used to encrypt the symmetric key; whereas symmetric key is used to encrypt the 
plaintext of message. The encryption stage of MePKC encryption scheme is 
experimentally tested (Lee & Tan, 2006) according to the pseudocode in Figure 6.3. 
Meanwhile Figure 6.4 shows the decryption stage of MePKC encryption scheme. 



(1.0) User A creates one's public key P A and send to user B: 

(1.1) P A — k A G (mod p) 

(2.0) User B creates one's public key Pb and send to user A: 

(2.1) P B — k B G (mod p) 

(3.0) User A is to send message M to user B: 

(3.1) P z ― zG (mod p); P D z(k B G) (mod p) ― zP B (mod p) 

(3.2) F — E*P Dx (mod p) 

(3.3) C encrypt(M, E), using AES-192. 

(3.4) Send P z , F, and C to user B. 



Figure 6.3 Encryption stage of MePKC encryption scheme (P-192) 



(1.0) User B receives P z , F, and C from user A. 

(2.0) User B decrypts for symmetric key E: 

(2.1) P D ― k B (zG) (mod p) ― k B P z (mod p) 

(2.2) F 1 multiplicativelnverse(F) (mod p) 

(2.3) E — P Dx * F 1 (mod p) — P Dx / F (mod p) 

(3.0) User B decrypts for message M: 

(3.1) M decrypt(C, E), using AES-192. 



Figure 6.4 Decryption stage of MePKC encryption scheme (P-192) 



58 



6.6.4 Signature Scheme of MePKC 

ECDSA stands for Elliptic Curve Digital Signature Algorithm. Using the 
ECDSA signature scheme (Hankerson, Menezes, & Vanstone, 2004, 2005), we 
firstly define parameter as follows: 

k A = user A's private key from a 192-bit secret, where < k A < n 

Pa = user A's public key 

k B = user B's private key from a 192-bit secret, where < k B < n 

P B = user B's public key 

z = 192-bit random number, where < z < n 

P z (Pzx , Pz y ) = point of random number z, satisfying P z = zG (mod p) 
r, s = 192-bit bitstream, where 0<r<n, 0<s<n 
M = message 

e = message digest by hashing message M using hash function like SHA-512 
DS = digital signature consisting of (r, s) 



(1.0) User A creates one's public key P A and send to user B: 

(1.1) P A — k A G (mod p) 

(2.0) User B creates one's public key Pb and send to user A: 

(2.1) P B — k B G (mod p) 

(3.0) User A is to sign message M: 

(3.1) Select randomly z from [1, n-1]. 

(3.2) P z — zG (mod p) 

(3.3) r Pzx (mod n); if r = 0, go back to Step (3.1). 

(3.4) e Hash(M), using SHA-512 and 192-bit hash truncation from MSB. 

(3.5) z" 1 <— multiplicativelnverse(z) (mod n) 

(3.6) s ト z _1 * (e + rk A ) (mod n); if s = 0, go back to Step (3.1). 

(3.7) DS ᅳ (r, s) 

(4.0) User A sends message M and digital signature DS(r, s) to user B. 



Figure 6.5 Signing stage of MePKc signature scheme (P-192) 



59 



Software prototype has also been built and tested for MePKC signature 
scheme (Lee & Tan, 2006) based on elliptic curve P-192 in Section 6.6.2. Figures 
6.5-6.6 shows the signing stage and verification stage of MePKC signature scheme, 
respectively. 



(1.0) User B receives message M and digital signature DS(r, s) from user A. 

(2.0) User B verifies the digital signature DS: 

(2.1) If r = or r 〉 n-l, reject the signature. 

(2.2) If s = or s 〉 n-l, reject the signature. 

(2.3) e Hash(M), using SHA-512 and 192-bit hash truncation from MSB. 

(2.4) s" 1 multiplicativelnverse(s) (mod n) 

(2.5) w s" 1 (mod n) 1 / s (mod n) 

(2.6) ui ew (mod n); U2 = rw (mod n) 

(2.7) V(V X , V y ) ― uiG + u 2 P A (mod p) 

(2.8) If V = co, i.e. point at infinity or zero point, then reject the signature. 

(2.9) V — V x (mod n) ᄂ 

(2.10) If V = r, then accept the signature; else, reject the signature. 

Figure 6.6 Verification stage of MePKC signature scheme (P-192) 

6.7 Other Cryptographic, Information-Hiding, and Non-Cryptographic 
Applications of Secret beyond 128 bits 

Other useful applications of the present invention in applying the created big 
memorizable secret is various other cryptographic, information-hiding, and non- 
cryoptographic applications needing a big memorizable secret(s). Interested readers 
may try to imagine those applications, and then will know that abundant fully big 
memorizable secret keys are needed, in which 2D key and multihash key can jointly 
solve this problematic demand. 

The other cryptographic applications include various PAKE (Password- 
Authenticated Key Exchange) like SPEKE (Simple Password Exponential Key 
Exchange) (Jablon, 2006) and SRP-6 (Secure Remote Password Protocol version 6) 
(Wu, 2003). 



60 



Meanwhile, information-hiding applications (Petitcolas, Anderson, & Kuhn, 
1999; Moulin & O' Sullivan, 2003) include stego-key in steganography (Simmons, 
1984, 1998; Anderson & Petitcolas, 1998; Cachin, 1998; Mittelholzer, 1999; Fridrich 
& Goljan, 2004; Fridrich, Goljan, & Soukal, 2004; Lu, 2005), secret key in 
symmetric watermarking, and private key in asymmetric watermarking (Swanson, 
Kobayashi, & Tewfik, 1998; Low & Maxemchuk, 1998; Hartung & Kutter, 1999; 
Mittelholzer, 1999; Mohanty, 1999; Wolfgang, Podilchuk, & Delp, 1999; Eggers, Su, 
& Girod, 2000; Collberg & Thomborson, 2002; Hachez & Quisquater, 2002; Arnold, 
Schmucker, & Wolthusen, 2003; Furon, 2005; Furon & Duhamel, 2003; Barni & 
Bartolini, 2004; Cayre, Fontaine, & Furon, 2005a, 2005b, 2005c; Lu, 2005; Cox, 
Doerr, & Furon, 2006; Furht & Kirovski, 2006a, 2006b). 

Lastly, non-cryptographic applications include seed for PRNG (Pseudo- 
Random Number Generator) and CSPRBG (Cryptographically Secure Pseudo- 
Random Bit Generator) (Eastlake, Crocker, & Schiller, 1994; Rukhin, Soto, 
Nechvatal, Smid, Barker, Leigh, Levenson, V angel, Banks, Heckert, Dray, & Vo, 
2001; Le Quere, 2004; Keller, 2005; Barker & Kelsey, 2007; Campbell & Easter, 
2007b) like the Blum-Blum-Shub (BBS) CSPRNG (Mollin, 2007a, p. 508, 2007b). 



61 



CHAPTER 7 RESEARCH METHODOLOGY (PART 4): 
ANTI-HACKING DATA STORAGE USING 
IMPROVED DIP SWITCH 

7.1 Overview 

A dual in-line package (DIL/DIP) switch has been modified to collectively 
link all the poles using a single actuator and called anti-hacking DIP switch. The 
actuator can be a raised/recessed slide, raised/recessed rocker, or piano-type (aka 
side/level), selectively switching on or off one/two groups of poles oppositely. A 
specific inventive application is when a 10/12-way anti-hacking DIP switch is 
integrated with two modular jack RJ45 sockets and a second storage device 
preferably via USB connection, a secure data storage resisting the computer hacking 
in a malicious computer network is created. This new component is simple, cost- 
effective, and anti-hacking. Yet a novel variant is NiPST+N 2 PST DIP switch with 
reverse activation. 

7.2 Introduction 

Hacking or cracking into a computer from a malicious computer network is a 
great threat to the information security of private and confidential data in this 
electronic society. History of hacking and cracking can be traced. To resist the 
hacking and cracking, network settings and firewall software (Ogletree, 2000) are 
among the available best tools. However, these tools are complicated and not user- 
friendly to a networking novice like common Internet user. They are only good to 
network administrator who has undergone training and/or understood the operating 
manual. 

In other words, network settings and firewall software are excellent at the 
server side but not the client side. Technical difficulty and affordable cost are two 
main factors discouraging the users to adopt these two anti-hacking approaches 
effectively. Furthermore, end users normally do not require data sharing via web 
hosting like server. This indicates that private and confidential data of end users can 



62 



actually be partitioned from the data without security concern. For more information 
on the imperative demand of anti-hacking data storage, please refer to a book excerpt 
by Burgess and Power (2008) as follows: 

"The U.S. Chamber of Commerce estimates that counterfeit and pirated 
products account for 5 percent to 7 percent of the global economy, and results in the 
loss of more than 750,000 jobs and approximately $250 billion in sales to the United 
States alone 

The threats of economic espionage and intellectual property (IP) theft are 
global, stealthy, insidious, and increasingly common. According to the U.S. 
Commerce Department, IP theft is estimated to top $250 billion annually and also 
costs the United States approximately 750,000 jobs. The International Chamber of 
Commerce puts the global fiscal loss at more than $600 billion a year." 

In addition to the financial loss of confidential information and business 
secret, there are cronies of organized crime using the hacked secrets, flash mob 
approach, and sound snatching to conspire for more serious crimes like to worsen a 
good human relationship and/or to fasten a cheating human interaction. Married 
couples may be made divorced. Lovers may be made suspicious between themselves. 
Relatives, friends, colleagues, and organization members may be made trust-less and 
negatively emotional. Cheaters may succeed to establish trust, cultivate positively 
false emotion, and build a dishonest relationship leading to a marriage for sharing or 
even controlling the power, wealth, reputation, and fame of a single man or woman 
with good social status. In short, the criminals may cheat for secret, sex, trust, 
emotion, power, money, and assets. 

Beaver (2004) reported that a networked computer without proper firewall 
(Ogletree, 2000) settings would be hacked within 30 minutes. Yet in the latest news, 
Markoff (2008) informed that the hacking period dropped to less than 5 minutes after 
a hacker had operated for 30 seconds to access a prey computer. This reflects how 
serious and dangerous the current computer communications network security 
(Stallings, 2000) is in this networked info-computer era. 



63 



Identity theft can happen when a hacker copies a prey's computer data as disk 
image using disk cloning software, and then put the disk image into a second 
computer and modify, add, delete, etc. on some contents, which can create imitator- 
type zombie computer and/or infected-type botnet. This imitator-type zombie 
computer, when connected to the Internet, can fool other prey hackers watching this 
zombie computer version 2. Of course, if there are any confidential information, 
business secret, and other intangible assets, in the prey computers, then they shall be 
considered as disclosed and released to the hackers, or wider to the public domain. 

Here, method and device are proposed to secure an anti-hacking data storage 
for end users. This method uses a new component called anti-hacking DIP switch 
integrated with two modular jack sockets and a second storage device like hard disk 
drive (HDD) or USB (Universal Serial Bus) flash drive. Private and confidential data 
is stored in the second storage device. An ti -hacking DIP switch controls the normal 
networking mode while it is switched into one direction and anti-hacking mode while 
it is switched into the opposite direction. This method is simple, cost-effective, and 
hack-proof. End users can use this method to have anti-hacking working 
environment without risking the firewall. 

7.3 Proposing Improved DIP Switch 

For conventional n-way nPST (n Poles Single Throw) DIP switch, all the n 
poles are independently switched on or off in parallel with the pin pairs 101 and 102. 
A simple structural diagram of a 10- way DIP switch is shown in Figure 7.1. Here, a 
modified DIP switch called anti-hacking DIP switch is innovatively proposed, where 
all the individual switches of the DIP switch are joined and controlled 
simultaneously by a transverse slider acting as an actuator in Figure 7.2. Alternative 
actuators are raised/recessed slide, raised/recessed rocker, or piano-type (aka 
side/level). When a USB connection is considered, an 8-way anti-hacking DIP switch 
for Ethernet cable will become 10/1 2- way, or an extra 2/4- way DIP switch. The 
slider 103 can be wiped transversely to the pin pairs 104 and 105 to either switch on 
the networking connection and off the connection of the second storage device, or 
oppositely. This means DIP switch is 10/ 12- way nPDT (n Poles Double Throws). 



64 



101 




> 102 



Figure 7.1 Structural diagram of conventional 10- way DIP switch 



104 < 




103 



105 



Figure 7.2 Structural diagram of proposed 10/12-way anti-hacking DIP switch 



There are two groups of poles in opposite connections: 8-way RJ45/RJ11 
networking connection and 2/4 -way USB connection. 10Mbps and 100Mbps 
Ethernet over twisted pair can use 4-way connection, but lGbps/ 1000Mbps Ethernet 
must use 8-way connection. For USB connection, it can be 4 or 2 ways by saving the 
power and ground cables. It is then integrated with two RJ45 sockets and two USB 
sockets to form a simple and cost-effective innovation (Lee, 2008a, 2008b, 2008c). 

If Category 5/5e cable defined in ANSI/TIA/EIA-568-A and TIA/EIA-568-B, 
respectively, is used, the RJ45 socket will be backwards compatible with RJ11 for 
two running pairs and one running pair, respectively. 



65 



7 A Method and Device to Secure Anti-Hacking Data Storage 

Insofar as the anti-hacking DIP switch is specifically designed for a method 
and device to secure an anti-hacking data storage. An 8/ 10- way anti-hacking DIP 
switch is integrated with two modular connector RJ45 sockets to connect or 
disconnect the networking connection, and two optional USB sockets to oppositely 
disconnect or connect the second storage device on a PCB (Printed Circuit Board). 
The integration without USB sockets functioning as an RJ switch can be 
implemented as a wall plate for new installation or as an external interconnection box 
for old design and inconvenient switch access. 

For the end user's computer, a second storage device is needed. This can be 
either an internal or external hard disk drive (HDD). It can also be a USB flash drive. 
For external HDD and USB flash drive, they are hot-swappable when USB port is 
used. For internal HDD of the type of SATA (Serial Advanced Technology 
Attachment), a switch is needed to control the data connection. This switch called 
HDD switch can be an 8-way DIP switch installed at the back panel of computer with 
old design or at the front panel of computer with new design. Similarly, the 
connection of external HDD and USB flash drive via USB port can adopt a 2/4 -way 
switch. This can get rid of the plug-and-play which can cause reliability problem 
after frequent plugging and unplugging. 



Table 7.1 Operating modes of method and device to secure anti-hacking data storage 



Operating Mode 


Networking Connection 


Second Storage Device 


Anti-hacking 


Disconnected 


Connected 


Network access 


Connected 


Disconnected 



For real implementation, an RJ switch has been designed and constructed by 
Kok-Wah Lee, and burnt by Voon-Chet Koo on to a PCB, as an interconnection box 
from an 8-way DIP switch and two RJ45 sockets. The end user uses a computer 
connected to an external HDD via USB port. The storage device can also be a USB 
flash drive. An Ethernet cable links the RJ45 socket of the interconnection box and 



66 



computer. Second Ethernet cable links the second RJ45 socket of the interconnection 
box and the networking wall plate. Clearly, these can be easily understood by any 
normal end user. The 8-way switch can also be made 10/ 12- way if the optional USB 
connection is added. Then, there are two operating modes as in Table 7.1. 

For secure anti-hacking operating mode, the actuator is switched to 
disconnect the networking connection and then connect the second storage device. 
The end user can create, open, modify, and store one's private and confidential data 
in the second storage device. When network access is needed, the second storage 
device is disconnected and then the network is connected. The end user can now surf 
the Internet and one's data in the second storage device is safe from hacking via the 
malicious computer network. Once the demand for network access has finished, the 
end user can switch back to the anti-hacking operating mode to manipulate the 
private and confidential data. Thus, original plaintext and decrypted ciphertext can be 
securely stored from virtual hacking at the second storage device. 

7.5 Other Forms of Innovation 

An innovation of the improved 8-way 8PST DIL switch as in Figures 7.1-7.2 
is to become a 10- way 8PST+2PST DIL switch with an actuator activating 8PST and 
2PST in opposite direction, where 8PST controls the network connection of RJ-XX 
and 2PST is extendable to other nPST to control the hot-swappable USB or SATA 
data/power connection to create an anti-hacking data storage as in Figure 7.3. 

As in Figures 7.1-7.2, the 8-way 8PST DIL switch acting as RJ switch for 
wired Ethernet network can be modified to become 4-way 4PST DIL switch acting 
as hot-swappable USB switch to control the wireless network connection using the 
wireless USB network adapter operating on the wireless communication protocols 
like Bluetooth, Wi-Fi, 3G, WiMAX, etc. 

In Figure 7.3, the 10- way 8PST+2PST DIL switch with reverse activation 
630 can be modified to have the first 8PST 610 acting as RJ switch or to become 
4PST acting as a USB switch for wireless USB network adapter in similarity with 
Figures 7.1-7.2, and the second 2PST 620 is extendable to other nPST for other types 



67 



of data connection, like SAT A and USB, to a storage device like HDD and USB 
flash drive. 



630 



r 



610 



620 



610 



ノ 



620 



Figure 7.3 Innovated 10- way 8PST+2PST DIL switch activated in opposite direction 



The improved DIL switch so far can be other types of switch performing 
these enhanced functions to create anti-hacking data storage, where they can also 
switch on or off a few little switches to control the data and power connections like 
keylock switch, selector switch, pushbutton switch, rocker switch, rotary switch, 
slide switch, toggle switch, etc., with or without a light indicator of network 
connection. 

There are also some originally novel prototypes for this innovated DIP switch 
in the forms of layout-design of integrated circuit in Malaysia (Lee, 2005, 2006b, 
2007b, 2007c, 2007d, 2007e, 2008d, 2008e, 2008f, 2008g). 



68 



CHAPTER 8 RESULTS & DISCUSSIONS 



8.1 Overview of Results 

For all the four major novel knowledge contributions proposed by Kok-Wah 
Lee, they can work alone or be integrated to work as a whole as in Figure 8.1. 



(1.0) User creates an n-bit big memorizable secret, using 2D key. 
(2.0) User feeds the created 2D key as n-bit master key and optionally other 
parameters into the processing of multihash key to generate multiple n-bit slave 
keys for offline or online accounts. 

(3.0) Each n-bit slave key can be used for any application needing n-bit secret key. 
(4.0) Those application types are cryptographic, information hiding, and non- 
cryptographic types. 

(5.0) For PKC using fully memorizable private key directly from 2D key or 
indirectly, MePKC (Memorizable Public Key Cryptography) is created. 
(6.0) Anti-hacking data storage using improved DIP switch is used to securely 
store the original plaintext and decrypted ciphertext. 

Figure 8.1 Overview of the four major novel knowledge contributions 



8,2 Two-Dimensional (2D) Key 

8.2.1 Discussions: High-Entropy Secret 

The advantages of 2D key are good memorizability, high-entropy key, high 
randomness due to pictorial nature of key styles in 2D space, more references at the 
user interface to facilitate key input, and resistance to dictionary attack. Even pre- 
computation attack can be avoided if the 2D secret is used on the platform of 
MePKC. Moreover, for a long passphrase having many individual units like word, 
the key input time of 2D key is faster than the single-line key field whenever there is 
some interrupt and the user has forgotten the input sequence. This is because only 
that particular sub-unit has to be keyed in again and not the whole secret, such like 
the secret style of multiline passphrase. 

For memory medium, 2D key can be used in paper form and computer form. 
In term of memory scale, 256 bits can be maximally achieved by most people. The 



69 



user's capability in the graphical nature of 2D key decides a person's maximum 
mnemonic 2D key size. Key styles like crossword, ASCII art, and Unicode art are 
excellent in resisting guessing attack and dictionary attack. So far there is no feasibly 
comprehensive dictionary for ASCII art or Unicode art yet on Earth planet. 
Meanwhile for crossword, the bilingual or multilingual nature and its flexible word 
architecture can fail the operation of dictionary attack. 

Hence, 2D key is unique away from the currently practised ID (one- 
dimensional) nature of single-line key/password field, in which 2D key has 
collectively the features of bigger mnemonic key size and higher randomness. In 
other words, 2D key is a type of high-entropy secret. 

8.2.2 Limitations 

Table 4.1 shows the setting sufficiency of 2D key input method. Meanwhile, 
Table 6.1 shows the possible dimensions of 2D key to have fulfilled the equivalent 
threshold symmetric key sizes at different security strength. From these two tables, 
we can see that Unicode-based 2D key can be entered by a user using less number of 
characters than ASCII-based 2D key, but the current button set of keyboard design 
for ASCII encoding has limited the input speed of each Unicode character. Thus, 
regardless of ASCII-based 2D key or Unicode-based 2D key, one of its 
disadvantages is more time for key input. 

For the second weakness, due to non-simultaneous 2D key input upon 
disturbance, there is possible shoulder-surfing attack from the nearby people or 
camera, especially the currently popular usage of mobile phones with camera 
functions. Hence, small 2D key may be used at public areas; whereas bigger and 
stronger 2D key may be used at private areas, like personal room. This is because the 
bigger is the 2D key, the longer the time it needs to be entered, and the harder the 
simultaneity chance it can achieve. 

8.2.3 Conclusion 



70 



Here, the high-entropy 2D key input method has been proposed. It solves the 
memorizability problem due to human factor and user interface problem of single- 
line key/password field. For variability, 2D key has the key styles of multiline 
passphrase, crossword, ASCII art, Unicode art, colourful text, and sensitive input 
sequence. The memorizable limit of 96-bit key is increased to 256-bit key, where 
even the private key is memorizable. This creates 160-bit to 256-bit MePKC with 
protection period up to 50 years. 

8.3 Multihash Key 

8.3.1 Discussions: Comparisons 

Table 8.1 compares various key management tools with multihash key from 
the aspects of usability, security, and possible implementation. A lot of comparisons 
are attributed by Yee and Sitaker (2006) on Passpet. New features used for 
comparisons are applicability to offline and online accounts, integrated usages 
together with other key management tools and possible implementations. It is 
important to note here that multihash key can be used together with Passpet to earn 
"Yes" for items [L7-L9] under the security features in Table 8.1. 

Multihash key can be used for both offline and online accounts. Possible 
implementations are stand-alone application and browser extension. These are simple 
interfaces to input a password or key with unique key images for multiple accounts. 
Memorizability is improved since there is only one secret for various login accounts. 

Server is not used and hence there is no central authority. There are no single 
point of r ailure and high cost of integration. It is mobile and there is no encrypted 
storage of site keys. Since there is no integration, multihash key can be used for any 
existing computer systems. 

8.3.2 Discussions: Suitable Time Bounds 

The passcode is optional to be remembered by a user because it can be 
converted to be an 8-bit password supplement in one of the two methods of key 
strengthening (Manber, 1996; Abadi, Lomas, & Needham, 1997, 2000). Master key 



71 



is the password, and when it is combined with the password supplement, they form 
the full password. Another key strengthening method is also called key stretching, 
which uses a large amount of hash iterations (Kelsey, Schneier, Hall, & Wagner, 
1997). 



Table 8.1 Comparisons of key management tools 



Feature s\Key management tools 


Plain 

browser 


Password Password Windows 
autofill safe live ID 


LPWA 


HP site 
password 


CPG 


Password 
multiplier 


SPP 


Pwd 
Hash 


Passpet 


Multihash 

key 


Usability 


1. Make logging in more convenient 


No 


Yes 


No 


Yes 


Yes 


No 




Yes 


? 


No 


Yes 




2. Work with existing websites 


Yes 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


3. Allow site-by -site migration to 
tool 


Yes 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


4. Change individual site keys 


Yes 


Yes 


Yes 


No 


No 


Yes 


Yes 


Yes 


Yes 




Yes 


Yes 


5. Log in from other computers 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


6. Only need to memorize one secret 


No 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 




Yes 


Yes 


7. Enable changing the master secret 






Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


8. Applicability to offline accounts 






Yes 


No 


No 


No 


No 


No 


No 


No 


No 


Yes 


9. Applicability to online accounts 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


10. Integrate usages together with 
other tools 






Yes 


No 


No 


Yes 


No 


No 


No 


No 


No 


Yes 


Security 


1. Unique key for each account 


No 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


2. Resist offline dictionary attacks 


No 


No 


No 


No 


No 


No 


No 


Yes 


No 


No 


Yes 


Yes 


3. Adapt to increasing CPU power 


No 


No 


No 


No 


No 


No 


No 


Yes 


No 


No 


Yes 


Yes 


4. Avoid storing keys 


Yes 


No 


No 


No 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


5. Avoid a single central authority 


Yes 


Yes 


Yes 


No 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


6. Resist phishing by fake login 
forms 


No 


No 


No 


Yes 


Yes 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


7. Resist mimicry of browser UI 


No 


No 


No 


No 


No 


No 


No 


No 


No 


No 


Yes 


No 


8. Help the user identify websites 


No 


No 


No 


No 


No 


No 


No 


No 


No 


No 


Yes 


No 


9. Stop entering secrets in webpages 


No 


No 


No 


No 


No 


Yes 


? 


Yes 


? 


No 


Yes 


? 


Possible implementation 


1. Stand-alone application 


No 


No 


Yes 


No 


No 


Yes 


No 


Yes 


Yes 


Yes 


No 


Yes 


2. single sign-on server 


No 


No 


No 


Yes 


Yes 


No 


Yes 


No 


No 


No 


No 


No 


3. Browser extension 


Yes 


Yes 


No 


No 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 


Yes 



?: Unknown situation depending on implementation 



The variant of SHA-2, which is SHA-512, is used in the key hashing and key 
strengthening. This is because there are possible collision attacks to MD5 and SHA-L 



72 



The hash truncation creates a 256-bit hash as site key. The unused truncated bit 
creates a 128-bit security strength (256/2=128) preventing the compromised site keys 
at the higher security level from revealing the site keys at the lower security level. 
The passcode also has this feature but is very much less powerful. 

For the experimental data of lower bound k ᄂ and upper bound bu of some 
computer systems, there are reported as follows. For instance, for the first computer 
system of desktop PC [Example 1: Pentium II 266MHz, 192MB RAM, running on 
Windows XP Professional Edition SP1], the lower and upper bounds for 1 -second 
hash iteration, as in Figure 5.1, are 7600 and 8200, respectively. In other words, the 
first computer system can only support 20 offline accounts for a security level 
partitioning of 8 bits or 2 8 . 

Yet in the second computer system of desktop PC [Example 2: Pentium IV 
1.8GHz, 512MB RAM, running on Windows XP Home Edition (version 2002) SP2], 
the lower and upper bounds for 1 -second hash iteration are 39,400 and 41,700 
respectively. For this specification, the third computer system can support 100 offline 
accounts for a security level partitioning of 8 bits or 2 8 . 

Yet in the third computer system of laptop PC [Example 3: Centrino Duo 
1.66GHz, 1.5GB RAM, running on Windows XP Home Edition], the lower and 
upper bounds for 1 -second hash iteration are 81,700 and 93,700 respectively. For this 
specification, the second computer system can support 256 offline accounts for a 
security level partitioning of 8 bits or 2 8 . 

These three computer systems, together with other four, are summarized into 
Table 8.2. The fourth computer system is a desktop PC [Example 4: AMD Athlon 64 
Processor 3800+, 2.40GHz, 1GB RAM, running on Windows 7 Enterprise Edition 
(version 2009) (32-bit OS)]. The fifth computer system is a desktop PC [Example 5: 
Intel Pentium D (Dual Core) 2.80+2.79GHz, (512MB or 1GB) RAM, running on 
Windows XP Professional Edition (version 2002) SP3]. The sixth computer system 
is a desktop PC [Example 6: Intel Pentium Core2Duo CPU E4600, 2.40+2.39GHz, 
3.48/4GB RAM, running on Windows XP Professional Edition (version 2002) SP3]. 
The seventh computer system is a desktop PC [Example 7: Intel Core i3 2x2.93GHz, 
4GB RAM, running on Windows XP Home Edition (version 2002) SP2]. 



73 



Table 8.2 One-second time bounds of several computer systems 



No. 


CPU 


Lower 1 -Second 
Time Bound (loop) 


Upper 1 -Second 
Time Bound (loop) 


Range of Time 
Bound (loop) 


1 
丄 


Intel Pentium II 
266MHz 


ᄀ Ann 
/,ouu 


o,zuu 


ouu 


2 


Intel Pentium IV 
1.8GHz 


39,400 


41,700 


2,300 


3 


Intel Centrino Duo 
1.66GHz 


81,700 


93,700 


12,000 


4 


AMD Athlon 64 
Processor 3800+ 
2.40GHz 


69,900 


77,300 


7,400 




Intel Pentium D 
(Dual Core) 
2.80+2.79GHz 


78,200 


87,000 


8,800 


6 


Intel Pentium 
Core2Duo CPU 
E4600 2.40+2.39GHz 


69,000 


76,000 


7,000 




Intel Core i3 
2x2.93GHz 


185,300 


205,500 


20,200 



Using the proposed settings, the key strengthening has an access time from 
0.2 second to 2 seconds. This is an efficient range of acceptable login processing 
time. It can be calibrated to be parallel with the advances in computer technologies 
for new releases of multihash key. Moore's Law is a good rule to judge the 
calibration, which is about one bit faster for every two years. 

Key hashing and key strengthening are also good techniques to resist offline 
and online dictionary attacks as well as pre-computation attacks. To prevent phishing 
and spoofing attacks, multihash key can either be used together with other anti- 
phising tool like petname system and Passpet, or include domain name URL in its 
key hashing. Malicious server attack is also prevented as different accounts have 
unique passwords. For homograph attack due to visually similar Unicode graphic 
symbols, the implementation of multihash key shall support the Unicode characters. 

Up to here, the basic model of multihash key can support almost infinite 
number of online account. Meanwhile, the number of supported offline account by 
multihash key is given by Equation (8.1). From Figure 5.2, the security level x can be 



74 



increased up to the maximum of hash iteration number ゾ max . Also, hash functions 
beyond 512 bits like 768 and 1024 bits may be needed. 

Saco = X (8.1) 

8.3.3 Limitations 

Multihash key can be implemented as a stand-alone application with no 
change of setting at the server side. However, it is vulnerable to password file 
compromise attacks and message log file attacks. Nevertheless, domino effect of 
password reuse can be avoided. To get rid of password file compromise attacks and 
message log file attacks, some countermeasures (Gouda, Liu, Leung, & Alam, 2005) 
can be adopted by changing the settings of authentication approach at client and 
server sides. 

Acting as a stand-alone application, multihash key requires a user to perform 
extra steps. These steps are creating a key, copying, and pasting it to a login 
prompted textbox. The user also needs to remember the security level of an account, 
an at least 128-bit master key, and a numeric 4-digit passcode. These cause the 
solution to be not user-friendly. 

To facilitate the application, multihash key has to be integrated into the user 
interface of each authentication application. Therefore, the item [LI] of usability in 
Table 8.1 about convenient logging in depends on implementation. 

For security level, it can be jotted into a notebook in plaintext form because it 
is not an essential secret. Alternatively, for online account, the user can be reminded 
about the security level whenever the user sends the username to the server. This 
allows an attacker to reduce the number of hash testing by 20 times, or 4.32 bits 
Hog 2 20). 

For numeric 4-digit passcode, it gives an extra security of 13.29 bits 
(=log2l0 000) and is not an essential secret. This passcode can be made constant for 
user with poor memory. For user who can remember 128-bit master key, 4-digit 
passcode and security level, the effective security strength is 145.61 bits. For user 



75 



who can remember only the 128-bit master key, its security strength is 128 bits. 
Hence, security can be compensated for better usability. 

Using multihash key, limited number of multiple offline and online accounts 
can be supported as compared to the almost infinite number of online accounts for 
LPWA, HP Site Password, CPG, Password Multiplier, SPP, PwdHash, and Passpet. 
For more accounts, faster computer system is needed to have larger range of lower to 
upper 1 -second time bound. Or else, the partition between any two security levels has 
to be reduced. 

8.3.4 Conclusion 

The proposed invention of multihash key requires users to remember a master 
key and passcode to generate unique key hashes (aka site keys, slave keys) for 
multiple accounts. For security level, username, and domain name of a specific 
account, users can choose to write them down somewhere as they are not critical 
secrets. This is a balance between the usability and security. 

Multihash key can be used for offline and online accounts, where existing 
similar key management tools without encrypted site key storage can only be applied 
to online accounts. It is hoped that this proposal can release the human memory 
burden on required passwords or keys for various types of increasing accounts. To 
have better resistance to phishing and spoofing attacks, try to use multihash key 
together with an anti-phishing tool like petname system and Passpet. 

8.4 MePKC & Its Applications 

8.4.1 Discussions: Enablement of Amazing Functions 

Since the Diffie and Hellman's proposal (1976), PKC (Public Key 
Cryptography) has become a dream in public domain. Then the RSA of IFC (Integer 
Factorization Cryptography) (Rivest, Shamir, & Adleman, 1978, 1983) practically 
realizes the implementation of PKC for encryption scheme and digital signature 
scheme. Nevertheless, for about 30 years, the secure storage of private key at 
sufficient key size has been a long lasting open hard problem. The current prior arts 



76 



of private key storage are encrypted private key, split private key, and roaming 
private key. Their common feature, that there is no capable technique to create fully 
memorizable private key, has greatly constrained the popularity of public key 
certificate in particular, and the widespread of PKC applications in general. 

Mathematics and science with theory only and without any application can 
hardly stimulate a person's interest. For instance, mathematics is the queen of 
science, and number theory is the queen of mathematics. However, without the 
widespread applications of cryptography and computing, number theory would not 
have become a chapter in the further mathematics subject at pre-university (pre-U) 
level, like STPM in Malaysia (equivalent with Advanced Level (A-Level) in UK). It 
is because of the applications of knowledge, like mathematics and science, that 
humans have technologies later. 

Here, 2D key has enabled possible high-entropy private key, which is big, 
memorizable, and yet random. On the other hand, multihash key has solved the 
technical and legal problems to have different asymmetric key pairs for different 
PKC schemes. Gathering both the forces of 2D key and multihash key, a big secret 
from 2D key as the master key can generate multiple slave keys. Either the 2D key 
directly, or the slave keys indirectly, have solved the open hard problem of fully 
memorizable private key. In other words in term of authentication factor, "what you 
know" like secret can begin dominating the technology of private key storage, by 
replacing the currently dominant authentication factor "what you have" like token or 
encrypted ciphertext. 

Encryption scheme and signature scheme are the most common applications 
of PKC. Using Microsoft Visual Basic and Microsoft Visual C++ of Microsoft 
Visual Studio .NET 2003 (Academic Edition), Kok-Wah Lee has built prototypes of 
192-bit MePKC encryption scheme and signature scheme for experiment testing (Lee 
& Tan, 2006), based on the works of: 

(i) Kok-Wah Lee for ECC functions, multiplicative inverse function, data 
type conversion, and GUI in Microsoft Windows environment; 

(ii) multiplicative inverse function from a book by Menezes, Oorschot, and 
Vanstone (1996); 



77 



(iii) ECC functions from a few books (Blake, Seroussi, & Smart, 1999, 2005; 
Stallings, 2006); 

(iv) SHA-512 function from toolbox of Microsoft Visual C++ 2003; and 

(v) Alan Wee-Chiat Tan for programming the big number class in C++ 
language by sourcing the ideas of data type and arithmetic of school book from Kok- 
Wah Lee. 

Coming to Microsoft Visual Studio 2010, the class of big integer arithmetic 
(aka big number, arbitrary precision arithmetic) has now been included and provided. 
Thus, one can have more efficient and faster computations of big number, without 
inventing the wheels again. 

Other MePKC applications, that can be imagined for proof of concept, can be 
referred at Sections 6.2 and 6.6.1. They may or even can collectively solve some 
potentially critical social problems on Earth planet now in chain effect as follows: 

(i) Materials chain: Computer system as multi-purpose machine > electronic 
world > less demand for materials > less paper and more conserved jungle; less metal 
and more preserved ore supply > friendly Earth surface environment > green Earth. 

(ii) Residence chain: Computer communication network > Internet > online 
service providers > de-urbanization of population > de-centralization of water supply 

> less wasted clean water > more supply variety in terms of quality and quantity to 
suburban and village areas > friendly human living environment > green Earth. 

{in) Equipment chain: Recyclable materials to make computer? (i.e. an open 
problem) > computer system as multi-purpose machine > replacing other tools, 
machines, and equipment > nano-electronics > less space demand > more 
comfortable human population > friendly chemical environment > green Earth. 

(iv) Communications chain: Electronic communication and form processing 

> less transportation > less demand of petroleum > more efficient usage of electricity 
power > less energy demand > friendly climate environment > green Earth. 



78 



For the world summit conferences in the recent years, climate change is the 
main topic. From experts, they claim that upon an increase of 2°C (or 2 Kelvins) in 
temperature relative to the Earth average temperature in year 1900, then the Earth 
planet will fall into a positive feedback loop to keep on warming up the Earth planet. 
To prevent this event from happening, the present humans have to take immediate 
measures. 

8.4.2 Limitations 

For ASCII-based 2D key, the maximum key size of big secret for normal 
humans is 256 bits, where up to 256-bit MePKC can be realized and applied. To go 
until 512-bit MePKC, Unicode-based 2D key is needed. However, the present 
keyboard is designed for ASCII encoding, and it is not efficient to enter Unicode 
characters. 

During the input of 2D key, especially when it is really big, then a user may 
need to view the 2D key in plaintext form for the whole entry process. For small 2D 
key, the 2D key remaining in the hidden form of ciphertext can easily be ensured. 
Thus, shoulder- surfing attack and hacking attack exist for big 2D key. 

Shoulder-surfing attack can be avoided when big 2D key is used only at 
private areas like personal office, personal home, etc. Hacking attack can be stopped 
by firstly disconnecting the network access, before the input of big 2D key, and upon 
finishing entering the 2D key, then connect back to the network like Internet. We can 
adopt this approach by applying the anti-hacking data storage using improved DIP 
switch. 

Elliptic curve arithmetic is not an easy subject, but very difficult to 
understand. Thus, this subject may have hindered the progress and harbinger of 
MePKC and its applications. 

8.4.3 Conclusion 

MePKC and its applications can stretch from individual works, to small 
group works, to big group works, or even to super big group works. This can happen 



79 



depending on the human's needs for functions in the public key cryptography (PKC) 
to live in the electronic communications world. 

PKC is a way of secure communication. If one were at a university, one can 
observe the existence of some essential buildings like classroom for learning, library 
for book reading, hostel for accommodation, restaurant for food and beverage, bus 
stop and car parks for transportation, bank for financial services, and post office for 
mail communications and package delivery. There even exists an idiom saying that 
"Stamp collection is a hobby of kings, and a king of hobbies." as a reminder on the 
importance of message communications. In battles and wars, the military army is 
hence to attack, destroy, or capture the enemy's communication stations first. Thus, 
communications is an imperative, urgent, or important element in human life. 

"How to communicate more safely and efficiently in the electronic networked 
world?" is the main question to be answered by MePKC and its applications in this 
book. Till here, in this networked info-computer era, do you think that current human 
societies need computer hardware, computer software, communications network, 
Internet, multimedia informative contents, cryptography for secure communications, 
public key cryptography, and MePKC and its applications? Do they in great needs? 
Do they in immediate needs also? Otherwise, how to conserve a green Earth planet, 
in view of the current human population at about 7 billion in year 2011? 

8.5 Anti -Hacking Data Storage Using Improved DIP Switch 

8.5.1 Discussions: Costs and Reliability 

The current cost of a DIL switch in Malaysia ranges from MYR$3.88 to 
MYR$46.77 depending on the contact ratings of voltage and current, and operating 
life (Farnell, 2007). The FOREX (Foreign Exchange) of USD$1.00 was about 
MYR$3.50 in September 2007 and October 2008. Mass purchase over 500 pieces 
can reduce the unit price of DIL switch to MYR$2.56. Subsequently, it can be 
claimed that the added manufacturing cost is low and yet the added value of anti- 
hacking data storage is high. As at 26 April 2011, in Malaysia USD$1.00 would have 
MYR$2.9880. 



80 



The voltage and current of applied DIP switch will depend on the power over 
the Ethernet cable (i.e. PoE (Power over Ethernet), PoL (Power over LAN) or Inline 
Power), phone cable, and USB connection. Supplying power over Ethernet is 
strongly recommended to follow the IEEE Standard. Clause 33 of "IEEE 802.3-2005 
- Section Two" (LAN/MAN Standards Committee, 2005) provides 48 volts DC over 
two of the four available pairs on a Cat. 3 I Cat. 5 cable with a maximum current of 
400 mA for a maximum load power of 15.4 Watts. 

For the Ethernet cable over LAN in Malaysia, it is normally Cat. 5 T568B. 
Contact rating of phone cable for network usage is below the contact rating of 
Ethernet cable. If USB power cables travel through the DIP switch, then it is 4 ways 
and the contact rating is 5.25 V DC and 500 mA. Otherwise, it needs 2 ways and the 
contact rating of USB data cables is below 2.8 V and 20 mA for high speed USB 2.0. 

The reliability (aka operating life or service life) of DIP switch ranges from 
1,000 to 35,000 operations. The death of DIP switch depends on the change of 
contact resistance and the mechanical wear out of the actuator. It is expected that the 
improvements by Lin (1999) and Tai (2001) can further increased the operating life 
of DIP switch in parallel with the reduction of manufacturing materials, weight, and 
cost. It is a question on the balance of costs and reliability. 

This innovation is expected to be broadly used in the office environment, 
where there exists a lot of private and confidential data. If the anti-hacking operating 
mode and network access operating mode are activated once a day for five times per 
week, then the DIP switch can last for 3.85 years for the DIP switch with operating 
life of 1,000 operations. The contact ratings, operating life, and cost of DIP switch 
are closely correlated. Survey and research are needed for optimum manufacturing 
design and supply chain management. 

Yet another potentially broad application for men with good social status and 
women with good conditions, this anti-hacking data storage is also critical to protect 
their human interaction network, daily itinerary, future plans, and financial accounts 
from being maliciously conspired by the cronies of organized crime by using the 
hacked secrets, flash mob approach, and sound snatching. 



81 



8.5.2 Limitations 



There exists a possible loophole for anti -hacking DIP switch, where a skilful 
hacker can write spyware and send it to infect the first HDD of a networked 
computer during the network access operating mode. Then, the spyware is to copy 
the targeted original plaintext or decrypted ciphertext from the secure second storage 
device to the first hard disk drive during the anti -hacking operating mode. When 
back to the network access operating mode, the spyware automatically sends or the 
hacker hacks to get the duplicated secret files. 

In fact, this loophole is normally from an advanced hacker to have done so. 
Bait can be prepared to catch this type of hackers, but cooperation with the network 
services providers is needed. To get rid of the assistance of network services 
providers, or the network administrator of the network services provider is the 
malicious person, then partially true sensitive information or unique secrets have to 
be prepared in a bait computer to identity the hacker's human networks. 

This problem can also be avoided if the software architect of the OS like 
Microsoft Windows, Linux, and Apple Macintosh can cooperate and collaborate with 
the computer hardware architect to plant special local commands to execute, read, 
and write for a specially located storage device or computer port. For instance, a 
simple case is like the copying process from the secure second storage device to the 
first HDD can only be manually done via the keyboard command. In another case, 
the copying process may choose to ask for a password as pre-requisite first. 

To avoid another type of advanced hacker to do recovery of deleted file from 
the electronic storage devices like hard disk drive or flash disk drive, file shredder 
software can be used. So, for this anti-hacking method, system, and device, we can 
resist a big percentage of amateurish hackers using hacking tools designed by other 
expert hackers. 

To qualify for advanced hacker to break into this simple and cost effective 
method, the hacker has to know advanced computer programming language like 
C/C++ language and the secrets of common operating systems (OS) like Microsoft 
Windows. For some geniuses, they prefer to use Linux OS to do personalization. For 
instance, the advanced hacker has to know the network address of prey computer, file 



82 



location, file name, OS architecture, access time of isolated data storage device, 
online time of computer system, and anonymously safe IP address to receive the 
duplicated secret file to program one's hacking tools like spy ware to break into this 
proposed simple anti -hacking method and system. To resist this type of advanced 
hacker using personalized spyware, the secret file can be password protected by 2D 
key the big secret directly, or a slave key of multihash key indirectly. 

8.5.3 Conclusion 

Unless there is an advanced hacker who can interpret the weak 
electromagnetic radiation across the anti-hacking DIP switch, this proposed method 
and device for securing an anti-hacking data storage can be claimed to be fully 
resisting the hacking attacks. It is a simple integration consisting of an improved DIP 
switch, two RJ45 sockets, and two optional USB sockets. The proposed switch adds 
little manufacturing costs but highly added values, which may be a 10- way switch 
for a RJ45/RJ11 and a USB connection. This anti -hacking method and device is 
simple, cost-effective, and may even be hack-proof when cooperation of computer 
hardware architect and software architect has been achieved. 



83 



CHAPTER 9 CONCLUSIONS 



9.1 Concise Summary 

In a nutshell, this doctoral research project has contributed a lot of originally 
novel knowledge contribution in the forms of methods, systems, and devices in the 
fields of information engineering, generally, and security engineering, particularly. 
Contribution impact by referring to the applications of research results for public 
usages is highly recommended in the operational direction of this project. 

Firstly, a method to create big and yet memorizable secrets called two 
dimensional (2D) key has been invented. To cater for the demands of multiple 
unique secrets to support various offline and online accounts, the multihash key 
using the hash iteration and hash truncation is then proposed. 

Later, we have applications of big secret(s), like the important MePKC 
(Memorizable Public-Key Cryptography). MePKC is realized by using the ECC 
(Elliptic Curve Cryptography). Then, to protect the original plaintext and decrypted 
ciphertext from hacking, anti-hacking data storage using improved DIP switch is 
designed. 

9.2 Suggestions for Future Research 

While reading the recommended supporting reading materials for this 
research project, readers may also consider developing any of the suggested research 
topics as discussed in this Section 9.2. 

9.2.1 512-Bit Multihash Key Needs Hash Function beyond 1024 Bits 

So far the popular and security intensively tested hash function is SHA 
(Secure Hash Algorithm) family. The longest message digest of this SHA is SHA- 
512 of SHA-2 with 512 bits. This has limited the application of multihash key to 
256-bit security for symmetric key and 128-bit security with 30-year protection for 
asymmetric private key. To achieve the higher security strength at 256 bits of 



84 



symmetric key strength for 512-bit asymmetric private key, multihash key needs to 
use 1024-bit hash function to generate 512-bit final slave key. 

For 1024-bit hash function, there exists a scalable polymorphic hash function 
(Roellgen, No date) to achieve this kind of message digest. Nevertheless, its security 
strength is not well tested by the peer researchers in information security. Therefore, 
while NIST is in the process of opening a website to accept the recommendation of 
SHA-3, even though its maximum hash value requirement is 512 bits, related 
researchers have to prepare themselves to go for a longer message digest up to 1024 
bits to realize the 256-bit to 512-bit MePKC (Memorizable Public-Key 
Cryptography). 

9.2.2 MePKC Extension to Other Non-Conventional Cryptographic Schemes 

In this thesis, the MePKC has been applied for encryption scheme and digital 
signature scheme. Other possible extensions are authentication, BAP (Byzantine 
Agreement Protocol), electronic commerce, and digital timestamping. 

Besides these conventional cryptographic schemes, interested researchers 
may apply MePKC for other non-conventional cryptographic schemes like key 
exchange, blind signature, multisignature, group -oriented signature, undeniable 
signature, threshold signature, fail-stop signature, group signature, proxy signature, 
signcryption, forward-secure signature, designated-verifier signature, copy protection, 
electronic cash, electronic voting, MAC (Message Authentication Code), key escrow, 
online verification of credit card, etc. Others include digital cheque (aka electronic 
cheque), software licensing, public-key certificate of public-key infrastructure (PKI), 
and multihash signature. 

The blind signature scheme includes its further applications for electronic 
cash (aka e-cash, electronic money, e-money, electronic currency, e-currency, digital 
cash, digital money, digital currency, or scrip), and electronic voting (aka e-voting, 
electronic election, e-election, electronic poll, e-poll, digital voting, digital election, 
or digital poll). 



85 



9.2.3 Big Secret(s) for Information-Hiding and Non-Cryptographic 
Applications 

In addition to the big secret(s) applications for cryptographic schemes, 
Section 6.7 has listed other applications of big secret(s) including the information 
hiding and non-cryptographic applications. The information-hiding applications 
include steganography, symmetric watermarking, and asymmetric watermarking. 
The non-cryptographic applications are to be the seeds of PRNG (Pseudo-Random 
Number Generator) and CSPRNG (Cryptographically Secure PRNG). 

Hence, there are lots of spacious rooms to evaluate the key sizes and 
corresponding bits of strength of these other applications of big secret(s). It is highly 
expected for the existence of some literatures about their practically secure key 
lengths and protection periods like the cryptographic schemes ("Cryptographic Key 
Length Recommendation," No date; E. Barker, W. Barker, Burr, Polk, & Smid, 
2007a, 2007b; Gehrmann & Nashmd, 2005, 2006, 2007). 

9.2.4 Safety Box Using Computerized Lock 

For safety box using computerized lock (Domenicone, 2000), its key pad is 
purely numeric and the display panel is single-line. The short-term memory limits of 
digits have been studied by Miller (1956) to be an average of 7 items plus or minus 2 
(7 土 2) (Jones, 2002; Doumont, 2002), and further studies show that they depends on 
languages (Jones, 2002) in general and phonological short-term memory of 2-second 
period (Baddeley, Thomson, & Buchanan, 1975) in particular. It is 9.9 digits in 
Chinese language (Hoosain & Salili, 1988) and 5.8 digits in Welsh language (Ellis & 
Hennelly, 1980). 

In other words, for single-line numeric passcode of this type of safety box, a 
user using English, Chinese, or Welsh language will have a passcode with average 
entropy of 23.25, 32.89, or 19.27 bits, respectively. The strength of these key lengths 
is insecure whenever a brute force attack can be launched towards the safety box. 



86 



Therefore, 2-dimensional (2D) key is highly appreciated to be applied into 
the safety box using computerized lock. For the key pad, it can remain to be purely 
numeric in decimal digits or enlarged to become in hexadecimal digits. 

9.2.5 Provable Security Studies 

The only researcher, who is Kok-Wah Lee @ Xpree Jinhua Li, contributing 
to the originally novel knowledge in this book, is educated in electrical engineering 
in general and computer communications in particular. Hence, a lot of the proofs of 
the inventions and innovations here are based on building up engineering prototypes. 
Consequently, researchers in provable security, who are also mathematicians, are 
expected to analyze thoroughly the security strength and loopholes of the algorithms, 
methods, systems, devices, and apparatuses in security engineering in this thesis. 

The initial name of "provable security" is more accurate as "reduction-based 
security", which has explicitly been telling the feature of "experimental then analytic 
proof for this information security field by depending on the available cryptographic 
primitives like AES, RSA, ECC, etc. 

9.2.6 Statistical Surveys for Various Security Schemes 

Besides the provable security research over the inventions and innovations 
proposed here, researchers in statistics can also consider conducting surveys like 
some surveys (Adams & Sasse, 1999; Schneier, 2006; Florencio & Herley, 2007) to 
know about the minimum, mean, maximum, and median key lengths of those 
applications of method and system to create big and yet memorizable secret as 
proposed here. Similar statistical surveys can also be carried out for multihash key to 
know the statistical values of master keys and slave keys. 

9.3 Future Development of Keys the Secret 

These keys the secret need good generation methods (Scalet, 2005) and key 
management (Fumy & Landrock, 1993; Beach, 2001; Witty, 2001). Wailgum (2008) 



87 



questioned on whether there were too many passwords or humans were lacking of 
memory power. In term of memory, there are two forms: Recognition-based and 
recall-based. Weinshall and Kirkpatrick (2004) presented those recall-based 
passwords. Bill Gates with Microsoft has once claimed the ending of the passwords 
(Allan, 2004; Kotadia, 2004; Fried & Evers, 2006). 

Subsequently, there are introductions of some password alternatives like 
Information Card, Windows CardSpace (Wilson, 2008), Higgins Project, OpenID, 
Identity Metasystem (Jones, 2005; Cameron & Jones, 2006), Identity Selector, digital 
identity (Cameron, 2005; Cavoukian, 2006), Authorization Certificate, Extended 
Validation Certificate, etc. 

Furnell (2005) analyzed whether human could get rid of passwords and 
concluded that passwords could not be replaced. Here, if the inventions and 
innovations on big secret(s) creation methods and their applications are adopted, 
especially MePKC (Memorizable Public-Key Cryptography), the complicatedly 
mentioned password alternatives may be made simpler or at best be avoided. More 
literatures on password are available at PasswordResearch.com (No date) website 
[URL: www.passwordresearch.com]. 

For security of asymmetric key cryptosystems, the mathematical hard 
problems depend on the researchers' creativity and innovation as well as the 
computing technologies to crack them. For example, the cryptanalytic attacks like 
Wiener (1990) and so on, that can be discovered in the future, may request for longer 
asymmetric key sizes and/or other mathematical hard problems. Challenges with 
awards offered by the PKC services providers to crack certain PKC with certain key 
sizes are always there for the public to attempt. 

Anyway, the practically secure key sizes for symmetric and asymmetric key 
cryptosystems at different protection periods are always under the regular 
evaluations by a lot of researchers (Williams, 2002). Website of KeyLength.com 
[URL: www.keylength.com] ("Cryptographic Key Length Recommendation," No 
date) is a collection database for lots of documentations on these practically secure 
key sizes for various applications in security engineering, particularly, and 
information engineering, generally. 



88 



9.4 Conclusions 

To emphasize again on the imperative aim of this research project, here is the 
last paragraph. 

Let's create and maintain a networked info-computer age for a more 
paperless, trip-less, petroleum-less, and environment-friendly human society by 
having safer multipartite electronic computer communications as from the original 
and novel knowledge contribution of this research project. 



89 



APPENDIX A WRITING SYSTEMS OF THE WORLD 



2J0A\ wlp jo susses slsuw I.v 




ᅵ t,s 一. ct ^UVJLLy ᅲ vn.mlllv£ 



«M V L、 . ^ ta a ^wsl 

t J- ^ ] 



4fc£M -J 




m -E- ■ - I 



90 



Legend of writing systems of the world today: 

Latin (alphabetic) 

Cyrillic (alphabetic) 
國 Hangul (featural alphabetic) 
國 Other alphabets 

Arabic (abjad) 
國 Other abjads 
國 Devanagari (abugida) 

Other abugidas 
~] Syllabaries 

Chinese characters (logographic) 



Table A.l Functional classification of writing systems 



Type 


Symbol Representation 


Example 


Pictographic 


Pictorgram or iconic picture 


Hieroglyph, Cuneiform 


Ideographic 


Ideogram 


Way-finding sign, mathematical notation 


Logographic 


Morpheme 


Chinese character 


Syllabic 


Syllable 


Japanese kana 


Alphabetic 


Phoneme (consonant or vowel) 


Latin alphabet 


Abugida 


Phoneme (consonant + vowel) 


Indian Devanagari 


Abjad 


Phoneme (consonant) 


Arabic alphabet 


Featural 


Phonetic feature 


Korean hangul 



91 



Table A.2 List of languages by number of native speakers 



Language 


Family 


Ethnologue (Y2005) 


1 . Mandarin 


Sino-Tibetan Chinese 


873,000,000 


2. Hindi + Urdu 


Indo-European, Indo-Iranian. Indo- Aryan 


366,000,000 


3. Spanish 


Indo-European, Italic, Romance 


358,000,000 


4. English 


Indo-European, Germanic, West 


341,000,000 


5. Arabic 


Afro-Asiatic Semitic 


206,000,000 


6. Portuguese 


Indo-European, Italic, Romance 


177,500,000 


7. Bengali 


Indo-European, Indo-Iranian. Indo -Aryan 


171,000,000 


8 ᅵ Russian 


Indo-European, Slavic, East 


170,000,000 


9, Japanese 


Ja.pa.nese-Ryukyua.n 


122,000,000 


1 German 


Indo-European, Germanic, West 


100 000 000 


1 ] Pnniabi 


Indo -European, Indo-Iranian. Indo - Aryan 


88 000 000 


1 ? French 


Indo-European, Italic, Romance 


79 572 000 


13. Wu 


Sino-Tibetan Chinese 


77 200 000 


14 Ta vanese 

丄 1 m t f LL \ "11 人 그ᄂ 


Anstronpsian Mala vo-Pol vnesian Sunda-Sula wesi 


75 500 000 


1 S Korean 


Considered either lanpua isolate or Altaic 


74 000 000 


1 6 Telupu 

丄リ- X 니 L!S U 


Dravinian South Central 


69 700 000 


17 Marathi 


Tndo-Kuronean Tndo-Tranian Tndo- Arvan 


68 000 000 


1 S Vietnamese 


A ustro- Asiatic Mon -Khmer Vietic 


67 400 000 


19. Tamil 


Dravidian .Southern 


66 000 000 


20 Italian 


Indo-European, Italic, Romance 


61,500,000 


2 1 . Cantonese 


Sino-Tibetan Chinese 


54 800 000 


22. Sindhi 


Indo-European, Indo-Ira.nia.n, Indo - Aryan 


54 500 000 


23. Turkish 


Altaic, Turkic. Oshuz 


50,625,000 


24. Min 


Sino-Tibetan Chinese 


46 200 000 


25. Gujarati 


Indo-European, Indo-Iranian. Indo - Aryan 


46, 100,000 


26. Maithili 


Indo -European, Indo-Iranian, Indo - Aryan 


45,000,000 


27 Polish 


Tndo-Ruronean Slavic "West 


42 700 000 


28. Ukrainian 


Indo-European, Slavic, East 


39,400,000 


29. Persian 


Indo-European, Indo-Iranian, Iranian 


39,400,000 


30. Malayalam 


Dravidian, Southern - India 


35,800,000 


31. Kannada 


Dravidian, Southern 


35,400,000 


32. Tamazight 


Afro-Asiatic, Berber, Northern 


32,300,000 



Ref.: Wikipedia Contributors. (2008a, July 22). List of languages by number of native speakers, 
[Online] . Wikipedia the Free Encyclopedia. Available: 

http://en.wikipedia.org/w/index.php?title=Lis ᄂ of_languages_by_number_of_native_speakers& 
oldid=227300820 [2008, July 23]. 



92 



APPENDIX B CHILD-MADE 2D KEYS 

Authored by Wei-Tong Chui (徐伟 栋), Wei-Jian Chui (徐伟 坚), and Kok-Wah Lee (李 国华) 
in January 2009 

In this part, it is shown that children are also capable to create simple 2D keys by using the 
key styles of ASCII art to draw some Chinese characters. The authors of these child-made 2D keys in 
January 2009 in this Appendix B were 13 -year-old Wei-Jian Chui born in year 1996 (Figure B.l) and 
9-year-old Wei-Tong Chui born in year 2000 (Figure B.2). To get the key size of every 2D key, just 
multiply the number of ASCII characters of a 2D key by the value of 6.57 bits, or to be more accurate 
log 2 9>. A note here: Kok-Wah Lee being the main author has integrated each four Chinese characters 
created by them to form a meaningful Chinese phrase for easy remembrance. 



AAAAAA 
AAAAAA 
AVVVVA 
AAAAAA 
WWW 
AAAAAA 
AAAAAA 



AAVVAA 
AAVVAA 
AAVVAA 
WWW 
AAVVAA 
AAVVAA 
AAVVAA 



AAAAAA 
AAAAAA 
AAAAAA 
WWW 
AAAAAA 
AAAAAA 
AAAAAA 



VAAAAV 
VAAAAV 
WWW 
VAAAAV 
VAAAAV 
WWW 



Two [二] Ten [十] One [一] Day [曰] 
Figure B.l 2D keys using ASCII art and Chinese characters meaning "twenty one days" [ ニ "| 日] 



AVVVVA 
AAAAAA 
WWW 
AAVAAA 
AVAAVA 



AAAAAV 



Cloud [云] 



AVVVVA 
AAAVAA 
AAAVAA 
WWW 
AAVVAA 
AVAAVA 
VAAAAV 



Sky [天] 



AAAAAA 
AAAAAA 
WWW 
AAVVAA 
AAVVAA 



AAAAAA 



Job [ェ] 



AAAVAAA 
AAAVAAA 
VVVVVVV 
AAVVVAA 
AVAVAVA 
VAAVAAV 
AAAVAAA 



Wood [木] 



Figure B.2 2D keys using ASCII art and Chinese characters meaning "cloudy sky nurtures the woods" 

[云 天工 木] 



93 



APPENDIX C CHRONOLOGY OF MY PhD STUDY 

Table C.l shows the important events during Kok-Wah Lee's PhD study at FET (Faculty of 
Engineering & Technology) of MMU (Multimedia University) in Bukit Beruang, Melaka, Malaysia 
from November 2003 to April 2011. 



Table C.l Development timeline of K. W. Lee's research project 



Date 


Event of Development Timeline 


12 Nov. 2003 


Application form of research project submitted to MMU CRPP. 


27 May 2004 


Official registration of doctorate (aka PhD) project. 


14 Mar. 2005 


Proposal defence seminar. Pass result. 


19 Sep. 2005 


Solid idea completion date for anti-hacking data storage using improved DIP 
switch. 


14 Oct. 2005 


Solid idea completion date for 2D (two-dimensional) key input method. 


Oct. 2005 


Kok-Wah Lee the student claimed for thesis submission, but Hong -Tat Ewe the 
nominal supervisor claimed for prototypes, and at least one accepted journal plus 
one submitted journal, or a journal replaced by an international patent (? ). 


24 May 2006 


Solid idea completion date for MePKC (Memorizable Public Key Cryptography). 


05 Nov. 2006 


Software prototype of 2D key input method (version 1.1) was completed. 


24 Nov. 2006 


Software prototype of MobileEC ᄂ (version 1.2) to test the MePKC encryption 
scheme and signature scheme was completed. 


24 Nov. 2006 


Kok-Wah Lee claimed for completion of prototypes. 


29 Nov. 2006 


Hardware prototype of RJ45 switch was completed. 


14 Dec. 2006 


Solid idea completion date for multihash key. 


Jan. 2007 


Software prototype to test the feasibility of multihash key was completed. 


May 2007 


Kok-Wah Lee claimed for fulfillment of minimum conditions to have at least one 
accepted journal and one submitted journal. 


1 O 1ᄀ- 、ᄂ ^f\f\0 

18 reb. 2008 


First work completion seminar. 


01 April 2008 


Result of first work completion seminar: Fail. More novel works were requested. 


02 Jul. 2008 


Second work completion seminar. 


23 Jul. 2008 


Result of second work completion seminar: Pass. The student entered ABD (All 
but Dissertation) stage. 


23 Jul. 2008 


Kok-Wah Lee submitted notice of thesis submission to FET and IPS. 


21 Sep. 2008 


Integration of multihash key into 2D key to produce 2D key input method 
(version 2.0). 


25 Oct. 2008 


Stop of literature study. First draft of PhD thesis (version 1.0) was ready. 


01 Dec. 2008 


Approval of specific thesis title. 


14 Mar. 2009 


Electronic online archive-type publication at www.archive.org. 


25 Mar. 2009 


Approval and confirmation of external expert examiners' list. 



94 



01 Apr. 2009 


First submission of thesis draft (version 1.0) to IPS was rejected due to format. 


(\f. Ar、r onno 


nrst submission of thesis draft (version 1.0) to IP^ again was accepted. 


14 Apr. 2009 


IPS letter stating completion of PhD study. 


18 Aug. 2009 


Electronic plagiarism detection using software was requested by IPS, but Kok- 
Wah Lee asked for postponement by not giving the electronic copy of thesis. 


25 Aug. 2009 


First open viva (aka oral exam). K.W. Lee was absent due to collisions of 
intellectual property rights with new MMU Rules and Regulations governing the 
thesis examination process. Moreover, short of preparation time from notice to 
oral exam. Fail result. 


Zo vjci. zuuv 


IPS rejected the PhD thesis and considered examination fail. 


HQ Nnv OOOQ 
iNuv. zyjyjy 


jv. w . i^cc s wriLLcii icLLcr rct[LicSLiiig iro lor cidxiiicdLiuii on dpprupridLc progress 
of PhD candidature. 


13 Jan. 2010 


IPS oral reply via A.W.C. Tan on termination of PhD candidature. 


18 Jan. 2010 


Written appeal for reinstatement of PhD candidature. 


08 Feb. 2010 


PhD candidature conditionally reinstated. The conditions were K.W. Lee to fulfill 

Lilc 1V11V1 U UIllVcrSlLy KUlcS allU KcgLlld. LIOIIS, dS Well as IIlcQlCd.1 CcrLlllCdLlOIl on 

K.W. Lee's fitness to sit for the PhD thesis examination. 


04 Mar. 2010 


K.W. Lee's written letter to IPS for second thesis submission. 


17 Mar. 2010 


Second draft of PhD thesis (version 2.0) was ready. 


18 Mar. 2010 


IPS requested for oral exam directly without second round of thesis submission 
and K.W. Lee's signed declaration to fulfill any possible MMU University Rules 
and Regulations governing the thesis examination process. 


30 Mar. 2010 


K.W. Lee secondly applied for and reasoned on the second round of thesis 
submission to fulfill the IPS conditions. 


f\ A ゥ八 1 八 

20 Aug. 20 10 


Second open viva (aka oral exam) chaired by three thesis reviewers, a chairman, 
who was Kek-Kiong Tio (Mr.) (Dr.) having expertise in mechanical engineering, 
and another five committee members. Kok-Wah Lee attended the event. Fail 
result. PhD thesis was rejected and required major revisions of format and 
contents. 


22 Sep. 2010 


Reviewers' comments over the PhD thesis were received by Kok-Wah Lee from 
IPS. A maximum of one year was given before the re-submission of PhD thesis 
for re-examination. 


22 Dec. 20 10 


The requested works to count the real entropy of Chinese password in ASCII 
encoding by the thesis examiners were dropped by removing the contents of 
Chinese password in the thesis. Alan Wee-Chiat Tan the nominal supervisor 
requested for revised abstract to locate a new batch of external thesis examiners. 


24 Dec. 20 10 


Kok-Wah Lee submitted the updated abstract to A. W. C. Tan but rejected due to 
format. A series of disputes on MMU thesis format occurred later for weeks. 


14 Jan. 2011 


K. W. Lee asked the IPS for official and certified research thesis format 
acceptable by MMU, preferably at least one thesis sample was needed. 


21 Mar. 2011 


To fulfill the demand for acceptable thesis format by MMU, PhD supervisor was 

annlipH tn hp phan (tpH to V PrasaH (^J\ «ihri 1 1 vnin ll n 厂 haran PrasaH) who was a 

£IJJJJ 丄 LAJ VJ\^ 니 ItXIl! 속 LVJ V . 니 J. 1 CiauLL 、 V 131111 ᄂ 1 V £IJJ ᄂ ll£l 니 Itll till J. 1 ClCtOXX Jy W 11VJ W ClJ O. 

full professor at MMU FET. 


30 Apr. 2011 


Third draft of PhD thesis (version 3.0) was ready. 







95 





Checking of copyright plagiarism over the thesis. 




Second submission of thesis draft (version 3.0) to IPS again was accepted (? ). 
Thesis examination fee at MYR$600 was paid by K. W. Lee. 




Third open viva (aka oral exam). 




MMU senate letter on award of normal doctorate degree (i.e. Ph.D.). 




Convocation day. 



N.B. 1: MMU = Multimedia University, which is a brand name of UTSB. 
N.B. 2: UTSB = Universiti Telekom Sdn. Bhd, Malaysia. 

N.B. 3: Sdn. Bhd. (Sendirian Berhad) in Malayan language, i.e. private limited in English language. 
N.B. 4: FET = Faculty of Engineering & Technology, MMU, Bukit Beruang, Melaka, Malaysia. 
N.B. 5: CRPP = Center for Research and Postgraduate Programmes, now called IPS, MMU. 
N.B. 6: IPS = Institute for Postgraduate Studies, previously called CRPP, MMU. 



96 



REFERENCES 



[I] Abadi, M., Bharat, K., and Marais, J. (2000, October 31). System and method for generating 
unique passwords. USPTO Issued Patent US6141760, Filing Date: 31 October 1997, Issue 
Date: 31 October 2000. 

[2] Abadi, M., Lomas, T. M. A., and Needham, R. (1997, December 16). Strengthening 
passwords (Tech. Rep. No. SRC-1997-033). Palo Alto, CA, USA: Hewlett-Packard 
Company, HP Labs, Systems Research Center (SRC). 

[3] Abadi, M., Needham, R. M., and Lomas, T. M. A. (2000, June 20). Method and apparatus 
for strengthening passwords for protection of computer systems. USPTO Issued Patent 
US6079021, Filing Date: 2 June 1997, Issue Date: 20 June 2000. 

[4] Adams, A., and Sasse, M. A. (1999, December). Users are not the enemy. Communications 
of the ACM, 42(12), 41-46. 

[5] Adams, A., Sasse, M. A., and Lunt, P. (1997, August 12-15). Making Passwords Secure and 
Usable. Proceedings of the HCI on People and Computers XII, Bristol, UK, 1-19. 

[6] Allan, A. (2004, December 6). Passwords are near the breaking point (Tech. Rep. No. 
Gartner GOO 124970). Stamford, CT, USA: Gartner, Inc. 

[7] Anderson, R. (2001). Security engineering: A guide to building dependable distributed 
systems. New York, NY, USA: John Wiley & Sons, Inc. 

[8] Anderson, R. J., and Petitcolas, F. A. P. (1998, May). On the limits of steganography. IEEE 
Journal on Selected Areas in Communications, 76(4), 474-481. 

[9] Arnold, M., Schmucker, M., and Wolthusen, S. D. (2003). Techinques and applications 
digital watermarKing and content protection. Norwood, MA, USA: Artech House, Inc. 

[10] Baddeley, A. D., Thomson, N., and Buchanan, M. (1975, December). Word length and the 
structure of short-term memory. Journal of Verbal Learning and Verbal Behavior, 74(6), 
575-589. 

[II] Bailey, J. R. (1969, December 23). Slide switch. USPTO Issued Patent US3485966, Filing 
Date: 2 October 1968, Issue Date: 2 October 1968. 



97 



[12] Baltzley, C. A. (2000, November 28). Public key cryptosystem with roaming user capability. 
USPTO Issued Patent US6154543, Filing Date: 25 November 1998, Issue Date: 28 
November 2000. 



[13] Baltzley, C. A. (2001a, August 16). Public key cryptosystem with roaming user capability. 
USPTO Published Patent Application US2001/0014158, Filing Date: 28 March 2001. 

[14] Baltzley, C. A. (2001b, September 18). Public key cryptosystem with roaming user capability. 
USPTO Issued Patent US6292895, Filing Date: 19 June 2000, Issue Date: 18 September 
2001. 

[15] Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2007a, March). Recommendation 
for key management - Part 1: General ( revised) (NIST Special Publication 800-57). 
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST, 61-71. 

[16] Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2007b, March). Recommendation 
for key management - Part 2: Best practices for key management organization (NIST 
Special Publication 800-57). Gaithersburg, MD, USA: CSRC (Computer Security Resource 
Center), NIST. 

[17] Barker, E., and Kelsey, J. (2007, March). Recommendation for random number generation 
using deterministic random bit generators ( revised) (NIST Special Publication 800-90). 
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. 

[18] Barni, M., and Bartolini, F. (2004). Watermarking systems engineering: Enabling digital 
assets security and other applications. New York, NY, USA: Marcel Dekker, Inc. 

[19] Beach, G. [2001, April 15]. How do we manage our expanding collections of passwords and 
PINs?, [Online]. CIO.com. Available: http://www.cio.com/article/print/30161 [2008, 
September 10]. 

[20] Beaver, K. (2004). Hacking for dummies. Indianapolis, Indiana, USA: Wiley Publishing, Inc. 

[21] Bishop, M. (2003). Computer security: Art and science. Boston, MA, USA: Addison-Wesley. 

[22] Blake, L, Seroussi, U., and Smart, N. (1999, July). Elliptic curves in cryptography. In 
London Mathematical Society Lecture Note Series (No. 265). camondge, Cambridgeshire, 
UK: Cambridge University Press. 



98 



[23] Blake, I. F., Seroussi, G., and Smart, N. P. (Eds.). (2005, April). Advances in elliptic curve 
cryptography. In London Mathematical Society Lecture Note Series (No. 317). Cambridge, 
UK: Cambridge University Press. 



[24] Blaze, M., Diffie, W., Rivest, R. L., Schneier, B., Shimomura, T., Thompson, E., and Wiener, 
M. (1996). Minimal key lengths for symmetric ciphers to provide adequate commercial 
security. Chicago, Illinois, USA: A Report by an Ad Hoc Group of Cryptographers and 
Computer Scientists. 

[25] Blonder, G. (1996, September 24). Graphical password. USPTO Issued Patent US5559961, 
Filing Date: 30 August 1995, Issue Date: 24 September 1996. 

[26] Boat wright, M., and Luo, X. (2007, September 28-29). What do we know about biometrics 
authentication? ACM Proceedings of the 4th Annual Conference on Information Security 
Curriculum Development 2007, Kennesaw, Georgia, USA, 205-209. 

[27] Boneh, D., and Franklin, M. (2006, September 26). Systems and methods for identity— based 
encryption and related cryptographic techniques. USPTO Issued Patent US71 13594, Filing 
Date: 13 August 2002, Issue Date: 26 September 2006. 

[28] Borenstein, N., and Freed, N. (1992, June). Base64 content- transfer-encoding. In Request for 
comments (1341): MIME (Multipurpose Internet Mail Extensions): Mechanisms for 
specifying and describing the format of Internet message bodies (RFC 1341). Sterling, 
Virginia, USA: Network Working Group, The Internet Engineering Task Force (IETF). 

[29] Brainard, J., Juels, A., Rivest, R. L., Szydlo, M., and Yung, M. (2006, October 30 - 
November 3). Fourth-factor authentication: Somebody you know. Proceedings of the 13th 
ACM Conference on Computer and Communications Security (CCS 200b}, Alexandria, 
Virginia, USA, 168-178. 

[30] Brown, A. S., Bracken, E., Zoccoli, S., and Douglas, K. (2004, June 15). Uenerating and 
remembering passwords. Applied Cognitive Psychology, 18(6), 641-631. 

[31] Brown, R. P. (1983, June 21). Side actuated miniature DIP switch. USPTO Issued Patent 
US4389549, Filing Date: 23 November 1981, Issue Date: 21 June 1983. 

[32] Burgess, C., and Power, R. (2008, February 8). Secrets stolen, fortunes lost: Preventing 
intellectual property theft and economic espionage in the 21st century. Burlington, MA, USA: 



99 



Syngress Publishing (now is at Elsevier's Science & Technology publishing) (URL: 
http://www.syngress.com) (URL: http://www.elsevierdirect.com). 



[33] Cacmn, C. (1998, April 14-17). An information-theoretic model for steganography. 

Proceedings of the 2nd International Workshop on Information Hiding (IH '98 ) 7 LNCS 1^2^, 
Portland, Oregon, USA, 306-318. 

[34] Cameron, K. (2005, May). The laws of identity, [Online] . Microsoft Corporation. Available: 
http://msdn.microsoft.com/en-us/library/ms996456.aspx [2008, August 25]. 

[35] Cameron, K., and Jones, M. B. (2006, January). Design rationale behind the identity 
metasystem architecture, [Online] . Microsoft Corporation. Available: 
http://research.microsoftxom/~mbj/papers/Identity_Metasystem_Design_Rationa^^ 
[2008, August 25]. 

[36] Campbell, J., and Easter, R. J. (2007b, October 18). Security requirements for cryptographic 
modules (Annex C): Approved random number generators for FIPS PUB 140-2 (draft) (NIST 
HPS Pub 140-2 Annex C (Draft)). Gaithersburg, MD, USA: CSRC (Computer Security 
Resource Center), NIST. 

[37] Cavoukian, A. (2006, October). 7 laws of identity: The case for privacy -embedded laws of 
identity in the digital age, [Online] . IPC (Office of the Information and Privacy 
Commissioner) in Ontario, Canada. Available: http://www.ipc.on.ca/images/Resources/up- 
71aws_whitepaper.pdf [2008, August 25]. 

[38] Cayre, F., Fontaine, C., and Furon, T. (2005a, January 17-20). Watermarking security part 
one: Theory. Proceedings of the SPIE Conference on Security, Steganography, and 
Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, CA, USA, 746-757. 

[39] Cayre, F., Fontaine, C., and Furon, T. (2005b, January 17-20). Watermarking security part 
two: Practice. Proceedings of the SPIE Conference on Security, Steganography, and 
Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, CA, USA, 758-768. 

[40] Cayre, R, Fontaine, C., and Furon, T. (2005c, October). Watermarking security: Theory and 
practice. IEEE Transcations on Signal Processing, 55(10), 3976-3987. 

[41] Cohen, H., and Frey, G. (2006). Handbook of elliptic and hyperelliptic curve cryptography. 
Boca Raton, FL, USA: Taylor & Francis Group, Chapman & Hall/CRC. 



100 



[42] Collberg, C. S., and Thomborson, C. (2002, August). Watermarking, tamper-proofing, and 
obfuscation - Tools for software protection. IEEE Transactions on Software Engineering, 
28(8), 735-746. 



[43] Cowan, N. (2001). The magical number 4 in short-term memory: A reconsideration of mental 
storage capacity. Behavioral and Brain Sciences [Online], 24(1), 87-185. Available: 
http://www.bbsonline.Org/documents/a/00/00/04/46/index.html [2008, July 21]. 

[44] Cox, I. J., Doerr, G., and Furon, T. (2006, November 8-10). Watermarking is not 
cryptography. Proceedings of the 5th International Workshop on Digital Watermarking 2006 
(IWDW 2006), LNCS 4283, Jeju Island (aka Jejudo), Jeju Province (aka Jeju-do), South 
Korea, 1-15. 

[45] Cryptographic Key Length Recommendation , [Online] . (No date). Available: 
http://www.keylength.com [2008, October 23]. 

[46] Davies, J. H. E. (1997, March 4). Personal identification devices and access control systems. 
USPTO Issued Patent US5608387, Filing Date: 26 May 1994, Issue Date: 4 March 1997. 

[47] de Koning Gans, G., Hoepman, J.-H., and Garcia F. D. (2008, September 8-11). A practical 
attack on the MIFARE Classic. Proceedings of the 8th IFIP WG 8.8/11.2 International 
Conference on Smart Card Research and Advanced Applications ( CARDI^ 2008), London, 
England, UK, 267-282. 

[48] de Winter, B. (2008, October 7). Researchers show how to crack popular smart cards. 
InfoWoria, [Online] . Available: 

http://www.infoworld.com/article/08/10/07/Researchers_show_how_to_crack_popular_smart 
_cards_l.html [2008, October 16]. 

[49] Dharmarajan, M. R. (2005, June 16). Method and apparatus for password generation. 
USPTO Published Patent Application US2005/0132203, Filing Date: 12 December 2003. 

[50] Diffie, W., and Hellman, M. E. (1976, November). New directions in cryptography. IEEE 
Transaction on Information Theory, 77-22(6), 644-654. 

[51] Diffie, W., and Woods, W. A. (2006, June 22). Method for generating mnemonic random 
passcodes. USPTO Published Patent Application US2007/0300076, Filing Date: 22 June 
2006. 



101 



[52] Domenicone, R. (2000, May 3). Safety box assembly. EPO Published Patent Application 
EP0703341, Filing Date: 25 September 1995. 



[53] Doumont, J.-L. (2002, June). Magical numbers: the seven-plus-or-minus-two myth. IEEE 
Transactions on Professional Communication, 45(2), 123-127. 

[54] Eastlake, D. 3rd, Crocker, S., and Schiller, J. (1994, December). Request for comments 
(1750): Randomness recommendations for security (RFC 1750). Sterling, Virginia, USA: 
Network Working Group, The Internet Engineering Task Force (IETF). 

[55] Eggers, J. J., Su, J. K., and Girod, B. (2000). Asymmetric watermarking schemes, [Online] . 
Available: http://citeseer.ist.psu.edu/eggersOOasymmetric.html [2008, July 17]. 

[56] Ellis, N. C., and Hennelly, R. A. (1980). A bilingual word-length effect: Implications for 
intelligence testing and the relative ease of mental calculation in Welsh and English. British 
Journal of Psychology, 77,43-51. 

[57] Engelfriet, A. (2010, January/February) . Choosing an open source license. IEEE Software, 
27(1), 48-49. 

[58] Farnell. (2007). The Farnell inOne catalogue 2007/2008, [Book, Online]. Available: 
http://my.farnell.com [2008, January 24]. 

[59] Florencio, D., and Herley, C. (2007, May 8-12). A large-scale study of web password habits. 

Proceedings of the 16th ACM International Conference on World Wide Web, Banff, Alberta, 
Canada, 657-666. 

[60] Fonseca, D. E. (2003, December 9). Data line switch. USPTO Issued Patent US6660950, 
Filing Date: 24 July 2001, Issue Date: 9 December 2003. 

[61] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and 
Stewart, L. (1999, June). Request for comments (2617): HTTP authentication: Basic and 
digest access authentication (RFC 2617). Sterling, Virginia, USA: Network Working Group, 
The Internet Engineering Task Force (IETF). 

[62] Fridrich, J., and Goljan, M. (2004, December 14). Reliable detection of LSB steganography 
in color and grayscale images. USPTO Issued Patent US6831991, Filing Date: 22 June 2001, 
Issued Date: 14 December 2004. 



102 



[63] Fridrich, J., Goljan, M., and Soukal, D. (2004, January 18-22). Searching for the stego-key. 

Proceedings of the SPIE on Security, Steganography, and Watermarking of Multimedia 
Contents VI, San Jose, California, USA, 70-82. 

[64] Fried, L, and Evers, J. (2006, February 14). Gates: End to passwords in sight, [Online] . 
CNET Networks, Inc. Available: http://news.cnet.com/Gates-End-to-passwords-in- 
sight/2100-7355_3-6039177.html?tag=nw.ll [2008, August 23]. 

[65] Fumy, W., and Landrock, P. (1993, June). Principles of key management. IEEE Journal on 
Selected Areas in Communications, 77(5), 785-793. 

[66] Furht, B., and Kirovski, D. (2006a, April 18). Multimedia watermarking techniques and 
applications. Boca Raton, FL, USA: Taylor & Francis Group, Auerbach Publications. 

[67] Furht, B., and Kirovski, D. (2006b, May 3). Multimedia encryption and authentication 
techniques and applications. Boca Raton, FL, USA: Taylor & Francis Group, Auerbach 
Publications. 

[68] Furnell, S. (2005, March). Authenticating ourselves: will we ever escape the password? 
Network Security, 2005(3), 8-13. 

[69] Furon, T. (2005, September 15-17). A survey of watermarking security. Proceedings of the 
4th International Workshop on Digital Watermarking 2005 (IWDW 2005), LNCS 3710, 
Siena, Tuscany, Italy, 201-215. 

[70] Furon, T., and Duhamel, P. (2003, April). An asymmetric watermarking method. IEEE 
Transactions on Signal Processing, 57(4), 981-995. 

[71] Gabber, E., Gibbons, P. B., Matias, Y., and Mayer, A. (1997, February 24-28). How to make 
personalized web browsing simple, secure, and anonymous. Proceedings of 1st International 
Conference on Financial Cryptography 1997 (FC 1997), LNCS 1318, Anguilla, British West 
Indies, 17-31. 

[72] Ganesan, R. (1996a, July 9). Yaksha, an improved system and method for securing 
communications using split private key asymmetric cryptography. USPTO Issued Patent 
US5535276, Filing Date: 9 November 1994, Issue Date: 9 July 1996. 

[73] Ganesan, R. (1996b, September 17). System and method for centralized session key 
distribution, privacy enhanced messaging and information distribution using a split private 



103 



key public crypto system. USPTO Issued Patent US5557678, Filing Date: 18 July 1994, Issue 
Date: 17 September 1996. 

[74] Ganesan, R. (1998a, April 7). Computer system for securing communications using split 
private key asymmetric cryptography. USPTO Issued Patent US5737419, Filing Date: 7 June 
1996, Issue Date: 7 April 1998). 

[75] Ganesan, R. (1998b, May 5). Securing E-mail communications and encrypted file storage 
using yaks ha split private key asymmetric cryptography. USPTO Issued Patent US5748735, 
Filing Date: 7 June 1996, Issue Date: 5 May 1998. 

[76] Ganesan, R. (1998c, November 17). Computer system for centralized session key distribution, 
privacy enhanced messaging and information distribution using a split private key public 
cryptosystem. USPTO Issued Patent US5838792, Filing Date: 8 August 1996, Issue Date: 17 
November 1998. 

[77] Ganesan, R. (1999, May 18). Programmed computer for identity verification, forming joint 
signatures and session key agreement in an RSA public cryptosystem. USPTO Issued Patent 
US5905799, Filing Date: 15 October 1996, Issue Date: 18 May 1999. 

[78] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006a, May 31). Augmented 
single factor split key asymmetric cryptography -key generation and distributor. USPTO 
Published Patent Application US2007/0033392, Filing Date: 31 May 2006. 

[79] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006b, May 31). Secure login 
using augmented single factor split key asymmetric cryptography. USPTO Published Patent 
Application US2007/0186095, Filing Date: 31 May 2006. 

[80] Ganesan, R., Sandhu, R. S., Cottrell, A. P., and Austin, K. (2006c, May 31). Secure login 
using single factor split key asymmetric cryptography and an augmenting factor. USPTO 
Published Patent Application US2007/0033393, Filing Date: 31 May 2006. 

[81] Ganesan, R., Sandhu, R. S., Cottrell, A. P., Schoppert, B. J., and Bellare, M. (2006, May 2). 

Protecting one-time -passwords against man- in - the-middle attacks. USPTO Published Patent 
Application, US2007/0033642, Filing Date: 2 May 2006. 

[82] Ganesan, R., and Yacobi, Y. (1996, December 24). System and method for identity 
verification, forming joint signatures and session key agreement in an RSA public 



104 



cryptosystem. USPTO Issued Patent US5588061, Filing Date: 20 July 1994, Issue Date: 24 
December 1996. 

[83] Garcia, F. D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R. W., 
and Jacobs, B. (2008, October 6-8). Dismantling MIFARE Classic. Proceedings of the 13th 
European Symposium on Research in Computer Security (ESORICS 2008), Malaga, 
Andalusia, Spain, 97-114. 

[84] Gehringer, E. F. (2002, June 6-8). Choosing passwords: Security and human factors. 

Proceedings of the IEEE International Symposium on Technology and Society (ISTAd 2002), 
Raleigh, North Carolina, USA, 369-373. 

[85] Gehrmann, C., and Naslund, M. (Eds.). (2005, March 1). ECRYPT Yearly report on 
algorithms and keysizes (2004) (Report No. IST-2002-507932 D.SPA.10). Katholieke 
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in 
Cryptology (ECRYPT). 

[86] Gehrmann, C., and Naslund, M. (Eds.)- (2006, January 29). ECRYPT Yearly report on 
algorithms and keysizes (2005) (Report No. IST-2002-507932 D.SPA.21). Katholieke 
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in 
Cryptology (ECRYPT). 

[87] Gehrmann, C., and Naslund, M. (Eds.)- (2007, January 26). ECRYPT Yearly report on 
algorithms and keysizes (2006) (Report No. IST-2002-507932 D.SPA.16). Katholieke 
Universiteit Leuven, Leuven-Heverlee, Belgium: European Network of Excellence in 
Cryptology (ECRYPT). 

[88] Goal, P. M., and Kriese, S. J. (2004, August 26). Method and system for automated password 
generation. USPTO Published Patent Application US2004/0168068, Filing Date: 20 
February 2003. 

[89] Goldwasser, S. (1997, October 20-22). New directions in cryptography: twenty some years 
later (or cryptograpy and complexity theory: a match made in heaven). Proceedings of the 
38th Annual Symposium on Foundations of Computer Science (SFCS 1997), Miami Beach, 
Fl, USA, 314-324. 

[90] Gouda, M. G., Liu, A. X., Leung, L. M., and Alam, M. A. (2005, June 7-10). Single 
password, multiple accounts. Proceedings of the 3rd International Conference on Applied 



105 



Cryptography and Network Security (ACNS 2005), LNCS 3531, New York City, NY, USA, 



Industry / Short Paper Track, 1-12. 

[91] Hachez, G., and Quisquater, J. -J. (2002). Which directions for asymmetric watermarking ? , 
[Online]. Available: http://citeseer.ist.psu.edu/564734.html [2008, July 17]. 

[92] Halderman, J. A., Waters, B., and Felten, E. W. (2005, May 10-14). A convenient method for 
securely managing passwords. Proceedings of the 14th International Conference on World 
Wide Web 2005, Chiba, Japan, 471-479. 

[93] Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to elliptic curve cryptography. 
New York, NY, USA: Springer-Verlag New York, Inc. 

[94] Hankerson, D., Menezes, A., and Vanstone, S. (2005, August). Guide to elliptic curve 
cryptography [栖圆 曲 线密码 学 导论] (张焕 国, Trans, to Chinese language). Beijing [北京], 
China [中国]: Publishing House of Electronics Industry [电 子ェ业 出版社]. (Original 
published in 2004 in English language). 

[95] Haperen, P. V. (1997, May 16). Graphical password entry. UK Published Patent Application 
GB23 13460, Filing Date: 16 May 1997. 

[96] Hardesty, E. C. (1975, January 14). Electrical connecting devices for terminating cords and 
methods of assembling the devices to cords. USPTO Issued Patent US3860316, Filing Date: 
6 July 1973, Issue Date: 14 January 1975. 

[97] Hart, G. W. (1994, September). To decode short cryptograms. Communications of the ACM, 
37(9), 102-108. 

[98] Hartung, F., and Kutter, M. (1999, July). Multimedia watermarking techniques. Proceedings 
of the IEEE, 57(7), 1079-1107. 

[99] Haylock, S. E. (No date). Fingerprints, [Online] . Answers.com. Available: 
http://www.answers.com/topic/fingerprints-5 [2008, September 1]. 

[100] Hoffman, N. E. (1982, June 1). DIP swtich. USPTO Issued Patent US4332987, Filing Date: 
15 December 1980, Issue Date: 1 June 1982. 

[101] Hoosain, R., and Salili, F. (1988). Language differences, working memory, and mathematical 
ability. Practical aspects of memory: Current research and issues, 2, 512-517. 



106 



[102] Huang, T. D. (1985, February 19). Method for encoding Chinese characters. USPTO Issued 
Patent US4500872, Filing Date: 18 March 1982, Issue Date: 19 February 1985. 

[103] Ives, B., Walsh, K. R., Schneider, H. (2004, April). The domino effect of password reuse. 
Communications of the ACM, 47(4), 75-78. 

[104] Jablon, D. P. (2006, March 7). Cryptographic methods for remote authentication. USPTO 
Issued Patent US7010692, Filing Date: 9 June 2004, Issue Date: 7 March 2006. 

[105] Jermyn, L, Mayer, A., Monrose, R, Reiter, M., and Rubin, A. (1999, August 23-26). The 
design and analysis of graphical passwords. Proceedings of 8th USENIX Security Symposium, 
Washington D.C., USA, 1-14. 

[106] Jones, D. M. (2002, October). The 7+2 urban legend, [Online]. MISRA C Conference. 
Available: http://citeseer.ist.psu.edu/jones02urban.html; 
http://www.knosof.co.uk/cbook/misart.pdf [2008, July 20]. 

[107] Jones, M. B. (2005, May). Microsoft's vision for an identity metasystem, [Online] - Microsoft 
Corporation. Available: http://msdn.microsoft.com/en-us/library/ms996422.aspx [2008, 
August 25]. 

[108] Kanaley, R. (2001, February 4). Login error trouble keeping track of all your sign- oris? 

Here 's a place to keep your electronic keys, but you'd better remember the password. San 
Jose Mercury News. 

[109] Karp, A. H. (2003, May 6). Site-specific passwords (Tech. Rep. No. HPL-2002-39R1). Palo 
Alto, CA, USA: Hewlett-Packard Company, HP Laboratories Palo Alto, Intelligent 
Enterprise Technologies Laboratory. 

[110] Karp, A. H., and Poe, D. T. (2002, August 2). System- specific passwords. USPTO Published 
Patent Application US2004/0025026, Filing Date: 2 August 2002. 

[11 1] Keller, S. S. (2005, January 31). NIST- recommended random number generator based on 
ANSI X9. 31 Appendix A. z. 4 using the 3 -key triple DES and AE^ algorithms, [Online]. 
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. Available: 
http://csrc.nist.gov/groups/STM/cavp/documents/rng/931rngext.pdf [2008, May 19]. 



107 



[112] Kelsey, J., Schneier, B., Hall, C, and Wagner, D. (1997, September 17-19). Secure 

applications of low-entropy keys. Proceedings of the International Workshop on Information 
Security (ISW '97), LNCS 1396, Tatsunokuchi, Ishikawa, Japan, 121-134. 



[113] Klein, D. V. (1990, August 27). "Foiling the cracker": A survey of, and improvements to, 
password security (revised paper). Proceedings of the USENIX 2nd Security Workshop 
Program, Portland, Oregon, USA, 5-14. 

[1 14] Kormann, D. P., and Rubin, A. D. (2000, June). Risks of the Passport single signon protocol. 
Computer Networks, 33(1-6), 51-58. 

[1 15] Kotadia, M. (2004, February 25). Gates predicts death of the password, [Online] . CNET 

Networks, Inc. Available: http://news.cnet.com/Gates-predicts-death-of-the-password/2100- 
1 029_3 -5 1 647 33 .html?tag=nw.4 [2008, August 23]. 

[116] Kucera, H., and Francis, W. N. (1907). Computational analysis of present-day American 
English. Providence, Rhode Island, USA: Brown University Press. 

[117] Kurokawa, K. (1988, July). Quality and innovation [Japanese electronics industry]. IEEE 
Circuits and Devices Magazine, 4(4), 3-8. 

[118] Kurokawa, K. (1990, May 13-18). Quality and innovation. Proceedings of the 1990 IEEE 
International Conference on Robotics and Automation (ROBOT 1990), Cincinnati, OH, USA, 
Vol. 3,2180-2184. 

[119] Kurokawa, K. (1991, January). Quality and innovation. IEEE Control Systems Magazine, 
77(1), 47-51. 

[120] Kurokawa, K. (1997, April/May). Modeling human interactions. IEEE Potentials, J 6(2), Part 
2, 26-28. 

[121] LAN/MAN Standards Committee. (2005, December 9). Part 3: Carrier sense multiple 
access with collision detection (CSMA/CD) access method and physical layer specifications, 
[Online]. New York, NY, USA: IEEE Computer Society. Available: Access 
http://standards.ieee.Org/getieee802/802.3.html (to get) 

http://standards.ieee.org/getieee802/download/802.3-2005_section2.pdf [2008, January 24]. 

[122] Le Quere, P. (2004, March 30). High speed random number generation. USPTO Issued 
Patent US67 14955, Filing Date: 13 August 2001, Issue Date: 30 March 2004. 



108 



[123] Lee, K. W. (2005, September 19). An nP ST dual in-line package switch (DIL/DIP switch ) 
linking all the little actuators into a single actuator, [Electronic Component, Layout-Design 
of Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[124] Lee, K. W. (2006a, November 5). 2 -dimensional key input method version 1.1, [CD-ROM, 
Computer Program] . Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[125] Lee, K. W. (2006b, November 29). An Ethernet cable RJ45 switch for securing data 
communication and storage using conventional dual in-line package switch (DIL/DIP 
switch), [Electronic Component, Layout-Design of Integrated Circuit] . Available: Lee, K. W.. 
Bukit Beruang, Melaka, Malaysia. 

[126] Lee, K. W. (2007a, January). Account amount estimator of multihash key using key 
strengthening based on time response, [CD-ROM, Computer Program] . Available: Lee, K. 
W., Bukit Beruang, Melaka, Malaysia. 

[127] Lee, K. W. (2007b, October 19). An (nPST + reverse mPST) dual in-line package switch 
(DIL/DIP switch ) with two bigger actuators UriKing two groups of switches activated 
oppositely, [Electronic Component, Layout-Design of Integrated Circuit] . Available: Lee, K. 
W., Bukit Beruang, Melaka, Malaysia. 

[128] Lee, K. W. (2007c, December 11). An Ethernet cable RJ45 switch for securing data 
communication and storage using Gray hill 78H02T (double 4PST DIP switch J, [electronic 
Component, Layout-Design of Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, 
Melaka, Malaysia. 

[129] Lee, K. W. (2007d, December 11). An Ethernet cable RJ45 switch for securing data 
communication and storage using Gray hill 78H01 T (single 4PST DIP switch), [Electronic 
Component, Layout-Design of Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, 
Melaka, Malaysia. 

[130] Lee, K. W. (2007e, December 11). An Ethernet cable RJ45 switch for securing data 
communication and storage using Gray hill 78F01 T (single 2PST DIP switch), [Electronic 
Component, Layout-Design of Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, 
Melaka, Malaysia. 

[131] Lee, K. W. (2008a, May 8). An improved dual in-line (DIL) switch for securing data 
communication and storage. Malaysia Application of Utility Innovation (aka utility model or 



109 



small patent) UI 20070733, MylPO, Filing Date: 11 May 2007, Grant Date: 30 June 2010. 
Patent No.: MY-141830-A. 



[132] Lee, K. W. (2008b, May 8). An improved dual in-line (DIL) switch for securing data 
communication and storage. PCT Patent Application PCT/MY2008/000040, WIPO, Filing 
Date: 8 May 2008, Publication Date: 20 November 2008. 

[133] Lee, K. W. [李國 華]. (2008c, May 9). 應用於 保護 資料 通 訊 及存儲 安全 之 改良 

式隻 f 丁阅闘 improved dual in-line (DIL) switch for securing data communication and 

storage]. Taiwan (ROC) Patent Application TW0971 17364, TIPO, Filing Date: 9 May 2008. 
(in Chinese language). 

[134] Lee, K. W. (2008d, June 2). A telephone cable RJ11 switch for securing data communication 
and storage using Gray hill 78H01 T (single 4PST DIP switch J, [Electronic Component, 
Layout-Design of Integrated Circuit] . Available: Lee, K. W., BuKit Beruang, Melaka, 
Malaysia. 

[135] Lee, K. W. (2008e, June 2). A telephone cable RJ11 switch for securing data communication 
and storage using Gray hill 78F01 T (single 2PST DIP switch), [Electronic Component, 
Layout-Design of Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, Melaka, 
Malaysia. 

[136] Lee, K. W. (2008r, June 2). A USB switch for securing data communication and storage 
using Gray hill 78H01T (single 4PST DIP switch), [Electronic Component, Layout-Design of 
Integrated Circuit]. Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[137] Lee, K. W. (2008g, June 2). A USB switch for securing data communication and storage 
using Gray hill 78F01 T (single 2PST DIP switch), [Electronic Component, Layout-Design of 
Integrated Circuit] . Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[138] Lee, K. W. (2008h, July 25). Methods and systems to create big memorizable secrets and 
their applications in information engineering. Malaysia Patent Application PI 20082771, 
MylPO, Filing Date: 25 July 2008. 

[139] Lee, K. W. (2008i, September 21). 2 -dimensional key input method with multihash key 
version 2.0, [CD-ROM, Computer Program] . Available: Lee, K. W., Bukit Beruang, Melaka, 
Malaysia. 



110 



[140] Lee, K. W. (2008j, September 21). Mobile ECC version 2.0, [CD-ROM, Computer Program]. 
Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[141] Lee, K. W. (2008k, December 10). Methods and systems to create big memorizable secrets 
and their applications in information engineering. Singapore Patent Application SG 
200809162-1, IPOS, Filing Date: 10 December 2008, Now Abandoned. 

[142] Lee, K. W. (20081, December 18). Methods and systems to create big memorizable secrets 
and their applications in information engineering. PCT Patent Application 
PCT/IB2008/055432, WIPO, Filing Date: 18 December 2008, Publication Date: 28 January 
2010. 

[143] Lee, K. W. (2009a, March 14). Memorizable public-key cryptography (MePKC) & its 
applications, 1st ed. (version 1.0), [Online] . Internet Archive. Available: 
http://www.archive.org/details 舰 emorizablePublic-keyCryptographymepkcIts Applications 
[2010, March 08]. 

[144] Lee, K. W. (2009b, April). High-Entropy 2-Dimensional Key Input Method for Symmetric 
and Asymmetric Key Cryptosystems. International Journal of Computer and Electrical 
Engineering (IJCEE), 7(1), 1-8. 

[145] Lee, K. W. (2009c, November 07). 2 -dimensional key input method with multihash key 
version 3.0, [CD-ROM, Computer Program] . Available: Lee, K. W., Bukit Beruang, Melaka, 
Malaysia. 

[146] Lee, K. W. (2010a, September 11). 2 -dimensional key input method with multihash key 
version 4.0, [CD-ROM, Computer Program] . Available: Lee, K. W., Bukit Beruang, Melaka, 
Malaysia. 

[147] Lee, K. W. (2010b, September 15). Methods and systems to create big memorizable secrets 
and their applications in information engineering. Singapore Patent Application SG 
200809162-1, IPOS, Filing Date: 15 September 2010. 

[148] Lee, K. W. (2010c, November 08). Methods and systems to create big memorizable secrets 
and their applications in information engineering . United States Patent Application US 
2011/0055585, USPTO, Filing Date (Completion): 08 November 2010. 

[149] Lee, K. W., and Ewe, H. T. (2000, November 3-6). Coinware for multilingual passphrase 
generation and its application for Chinese language password. Proceedings of the 2006 



111 



International Conference on Computational Intelligence and Security (CIS 2006), 
Guangzhou, Guangdong, China, 1511-1514 (Part 2). 

[150] Lee, K. W., and Ewe, H. T. (2007, August). Multiple hashes of single key with passcode for 
multiple accounts. Journal of Zhejiang University Science A (JZUS-A), 5(8), 1183-1190. 

[151] Lee, K. W., and Tan, A. W. C. (2006, November 24). MobileECC version 1.2, [CD-ROM, 
Computer Program] . Available: Lee, K. W., Bukit Beruang, Melaka, Malaysia. 

[152] Lee, K. W., Teh, C. E., and Tan, Y. L. (2006, May 30-31). Decrypting English text using 
enhanced frequency analysis. Seminar conducted at the meeting of the National Seminar on 
Science, Technology and Social Sciences (STSS 2006), Kuantan, Pahang, Malaysia. 

[153] Liataud, J. P., and Maloney, M. L. (1983, March 8). DIP switch. USPTO Issued Patent 
US4376234, Filing Date: 5 May 1981, Issue Date: 8 March 1983. 

[154] Lilly, G. M. (2004, December 7). Device for and method of one-way cryptographic hashing. 
USPTO Issued Patent US6829355, Filing Date: 5 March 2001, Issue Date: 7 December 2004. 

[155] Lin, H. C. (1999, October 19). Dual inline package switch. USPTO Issued Patent 
US5967302, Filing Date: 6 March 1998, Issue Date: 19 October 1999. 

[156] Lockard, J. L. (1977, March 15). Miniature switch with substantial wiping action. USPTO 
Issued Patent US4012608, Filing Date: 25 March 1975, Issue Date: 15 March 1977. 

[157] Lockard, J. L. (1979, September 18). Impedance programming DIP switch assembly. USPTO 
Issued Patent US4 168404, Filing Date: 3 May 1978, Issue Date: 18 September 1979. 

[158] Log This, [Online]. (No date). Available: 

http://members.lycos.co.uk/wuul/logthis/readme.html [2008, March 25]. 

[159] Low, S. H., and Maxemchuk, N. F. (1998, May). Performance comparison of two text 
marking methods. IEEE Journal on Selected Areas in Communications y 76(4), 561-572. 

[160] Lu, C.-S. (2005). Multimedia security: Steganography and digital watermarking techniques 
for protection of intellectual property. Hershey, PA, USA: Idea Group Publishing. 

[161] Luo, H., and Henry, P. (2003, September 7-10). A common password method for protection 
of multiple accounts. Proceedings of the 14th IEEE 2003 International Symposium on 



112 



Personal, Indoor and Mobile Radio Communication (PIMRC 2003), Beijing, China, vol. 3 
2749-2754. 



[162] Macuch, P. L. (2005, November 22). Coaxial and DSL cable switch for controlling a 
computer connection to the Internet. USPTO Issued Design Patent D5 11749, Filing Date: 17 
November 2003, Issue Date: 22 November 2005. 

[163] Maghiros, L, Punie, Y., Delaitre, S., Lignos, E., Rodriguez, C, Ulbrich, M., Cabrera, M., 
Clements, B., Beslay, L., and van Bavel, R. (2005). Biometrics at the frontiers: Assessing the 
impact on society (Report No. EUR 21585 EN). Seville, Sevilla, Spain: European 
Commission, Joint Research Centre (JRC), Institute for Prospective Technological Studies 
(IPTS). 

[164] Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S. (2003). Handbook of fingerprint 
recognition. New York, NY, USA: Springer- Verlag New York, Inc. 

[165] Manber, U. (1996). A simple scheme to make passwords based on one-way functions much 
harder to crack. Computers & Security, 75(2), 171-176. 

[166] Markoff, J. (2008, October 20). A robot network seeks to enlist your computer. The New 
York Times, [Online] . Available: 

http://www.nytimesxom/2008/10/21/technology/internet/21botnet.html [2008, October 23]. 

[167] Marshall, D. (2003). .NET security programming. Indianapolis, IN, USA: Wiley. 

[168] Matias, Y., Mayer, A., and Silberschatz, A. (1997, December 8-11). Lightweight security 
primitives for e -commerce. Proceedings of the USENIX Symposium on Internet Technologies 
and Systems 1997, Monterey, California, USA, 95-102. 

[169] McCulligh, M. R. (2003, November 4). Password generation method and system. USPTO 
Issued Patent US6643784, Filing Date: 14 December 1998, Issue Date: 4 November 2003. 

[170] McNamara, J. (2003). Secrets of computer espionage: Tactics and countermeasures . 
Indianapolis, Indiana, USA: Wiley Publishing, Inc. 

[171] Menezes, A. J., Oorschot, P. C. V., and Vanstone, S. A. (1996). Handbook of applied 
cryptography. Boca Raton, FL, USA: CRC Press. 



113 



[172] Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our 
capacity for processing information. The Psychological Review, 63(2), 81-97. 



[173] Mittelholzer, T. (1999, September 29 - October 1). An information-theoretic approach to 
steganography and watermarking. Proceedings of the 3rd International Workshop on 
Information Hiding (IH '99), LNCS 1768, Dresden, Saxony, Germany, 1-16. 

[174] Mohanty, S. P. (1999). Digital watermarking: A tutorial review, [Online, Tech. Rep.]. 
Bangalore, Bayaluseeme, Karnataka, India: Indian Institute of Science. Available: 
http://citeseer.ist.psu.edu/572262.html [2008, July 17]. 

[175] Mollin, R. A. (2007a). Codes: The guide to secrecy from ancient to modern times. Boca 
Raton, FL, USA: Chapman & Hall/CRC, Taylor & Francis Group. 

[176] Mollin, R. A. (2007b). An introduction to cryptography (2nd ed.). Boca Raton, FL, USA: 
Taylor & Francis Group, Chapman & Hall/CRC 

[177] Moseley, B. E. (2006, February 2). Method and system for generating passwords. USPTO 
Published Patent Application US2006/0026439, Filing Date: 2 August 2004. 

[178] Moulin, P., and O' Sullivan, J. A. (2003, March). Information-theoretic analysis of 
information hiding. IEEE Transactions on Information Theory, 49(3), 56^-593. 

[179] NIST. (1995a, April 17). Secure hash standard (NIST HPS Pub 180-1). Gaithersburg, MD, 
USA: CSRC (Computer Security Resource Center), NIST. 

[180] NIST. (2002b, August 1). Secure hash standard (NIST HPS Pub 180-2 (+ Change Notice to 
include SHA-224)). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), 
NIST. 

[181] NIST. (2006c, March 13). Secure signature standard (DSS) (draft) (NIST HPS Pub 186-3 
(Draft)). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. 

[182] NIST. (2007b, June 12). Secure hash standard (SHS) (draft) (NIST HPS Pub 180-3 (Draft)). 
Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), NIST. 

[183] Ogletree, T. W. (2000). Practical firewalls. Indianapolis, Indiana, USA: Mac mill an 
Computer Publishing, Que Corporation. 



114 



[184] PasswordResearch.com, [Online] . (No date). Available: http://www.passwordresearch.com 
[2008, September 10]. 

[185] Pelzl, J., Wollinger, T., and Paar, C. (2004, April 5-7). High performance arithmetic for 
special hyperelliptic curve cryptosystems of genus two. Proceedings of the International 
Conference on Information Technology: Coding and Computing 2004 (ITCC 2004), Las 
Vegas, Nevada, USA, Vol. 2, 513-517. 

[186] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G. (1999, July). Information hiding - A 
survey. Proceedings of the IEEE: Special Issue on Protection of Multimedia Content, 57(7), 
1062-1078. 

[187] PGP Corporation. (2006). PGP Desktop 9.0 for windows user's guide. Palo Alto, California, 
USA: PGP Corporation, 229-232. 

[188] Rivest, R. (1992, April). Request for comments (IjzI): The MD5 Message-Digest Algorithm 
(RFC 1321). Sterling, Virginia, USA: Network Working Group, The Internet Engineering 
Task Force (IETF). 

[189] Rivest, R. L., Shamir, A., and Adleman, L. (1978, February). A method for obtaining digital 
signatures and public key cryptosystems. Communications of the ACM, 27(2), 120-126. 

[190] Rivest, R. L., Shamir, A., and Adleman, L. M. (1983, September 20). Cryptographic 
communications system and method. USPTO Issued Patent US4405829, Filing Date: 14 
December 1977, Issue Date: 20 September 1983. 

[191] Roellgen, C. B. (No date). Scalable polymorphic hash function, [Online] . Available: 
http://www.pmc-ciphers.com [2008, July 16]. 

[192] Ross, B., Jackson, C., Miyake, N., Boneh, D., and Mitchell, J. C. (2005, July 31 - August 5). 

Stronger password authentication using browser extensions. Proceedings of the 14th USENIX 
Security Symposium (SEC 2005), Baltimore, MD, USA, 17-32. 

[193] Rubin, K., and Silverberg, A. (2003, August 17-21). Torus-based cryptography. Proceedings 
of the 23rd Annual International ᄂ ryptology conference 2003 ( CRYPTO 2003), LNCS 2729, 
Santa Barbara, California, USA, 349-365. 

[194] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, 
M., Banks, D., Heckert, A., Dray, J., and Vo, S. (2001, May 15). A statistical test suite for 



115 



random and pseudorandom number generators for cryptographic applications (NIST Special 
Publication 800-22). Gaithersburg, MD, USA: CSRC (Computer Security Resource Center), 
NIST. 

[195] Sandhu, R., deSa, C., and Ganesan, K. (2003, June 19). One time password entry to access 
multiple network sites. USPTO Published Patent Application US2003/01 15452, Filing Date: 
19 December 2000. 

[196] Sandhu, R., deSa, C., and Ganesan, K. (2005a, April 19). System and method for password 
throttling. USPTO Issued Patent US6883095, Filing Date: 19 December 2000, Issue Date: 19 
April 2005. 

[197] Sandhu, R., deSa, C., and Ganesan, K. (2005b, September 6). High security crypto system. 
USPTO Issued Patent US6940980, Filing Date: 19 December 2000, Issue Date: 6 September 
2005. 

[198] Sandhu, R., deSa, C., and Ganesan, K. (2005c, November 29). System and method for crypto - 
key generation and use in crypto system. USPTO Issued Patent US6970562, Filing Date: 19 
December 2000, Issue Date: 29 November 2005. 

[199] Sandhu, R., deSa, C., and Ganesan, K. (2006a, March 21). Secure communications network 
with user control of authenticated personal information provided to network entities. USPTO 
Issued Patent US70 17041, Filing Date: 19 December 2000, Issue Date: 21 March 2006. 

[200] Sandhu, R., deSa, C., and Ganesan, K. (2006b, May 30). One time password entry to access 
multiple network sites. USPTO Issued Patent US7055032, Filing Date: 21 May 2004, Issue 
Date: 30 May 2006. 

[201] Sandhu, R., deSa, C., and Ganesan, K. (2006c, June 20). System and method for generation 
and use of asymmetric crypto -keys each having a public portion and multiple private 
portions. USPTO Issued Patent US7065642, Filing Date: 19 December 2000, Issue Date: 20 
June 2006. 

[202] Sandhu, R., deSa, C., and Ganesan, K. (2006d, June 27). System and method for 
authentication in a crypto -system utilizing symmetric and asymmetric crypto -keys. USPTO 
Issued Patent US7069435, Filing Date: 19 December 2000, Issue Date: 27 June 2006. 



116 



[203] Sandhu, R., deSa, C., and Ganesan, K. (2006e, November 2). Laddered authentication 
security using split key asymmetric cryptography. USPTO Published Patent Application 
US2006/0248333, Filing Date: 22 June 2006. 

[204] Sandhu, R., deSa, C., and Ganesan, K. (2006f, December 12). Method and system for 
authorizing generation of asymmetric crypto -keys. USPTO Issued Patent US7149310, Filing 
Date: 19 December 2000, Issue Date: 12 December 2006. 

[205] Sandhu, R. S., Ganesan, R., Cottrell, A. P., Renshaw, T. S., Schoppert, B. J., and Austin, K. 
(2007, February 12). Flexible and adjustable authentication in cyberspace. USPTO 
Published Patent Application US2007/0199053, Filing Date: 12 February 2007. 

[206] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006a, August 17). 
Asymmetric key pair having a kiosk mode. USPTO Published Patent Application 
US2006/0 182276, Filing Date: 14 February 2005. 

[207] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006b, August 17). 
Roaming utilizing an asymmetric key pair. USPTO Published Patent Application 
US2006/0 182277, Filing Date: 14 February 2005. 

[208] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006c, August 17). 
Architecture for asymmetric crypto -key storage. USPTO Published Patent Application 
US2006/0182283, Filing Date: 14 February 2005. 

[209] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006d, August 17). 
Technique for asymmetric crypto-key generation. USPTO Published Patent Application 
US2006/0 184786, Filing Date: 14 February 2005. 

[210] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006e, August 17). 
Authentication protocol using a multi-factor asymmetric key pair. USPTO Published Patent 
Application US2006/0184787, Filing Date: 14 February 2005. 

[211] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2006f, August 17). 
Multiple factor private portion of an asymmetric key. USPTO Published Patent Application 
US2006/0 184788, Filing Date: 14 February 2005. 

[212] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007a, March 8). 
Technique for providing multiple levels of security. USPTO Published Patent Application 
US2007/0055878, Filing Date: 14 February 2005. 



117 



[213] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007b, March 22), 
Asymmetric crypto-graphy with rolling key security. USPTO Published Patent Application 
US2007/0067618, Filing Date: 17 January 2006. 

[214] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007c, November 
8). Multifactor split asymmetric crypto -key with persistent key security. USPTO Published 
Patent Application US2007/0258585, Filing Date: 5 May 2006. 

[215] Sandhu, R. S., Schoppert, B. J., Ganesan, R., Bellare, M., and deSa, C. J. (2007d, November 
8). Secure login using a multifactor split asymmetric crypto -key with persistent key security. 
USPTO Published Patent Application US2007/0258594, Filing Date: 5 May 2006. 

[216] Scalet, S. D. (2005, December 1). How to write good passwords, [Online] . CIO.com. 
Available: http://www.csoonline.com/article/print/220721 [2008, September 19]. 

[217] Schneider, J. (2004, December 9). Graphical event-based password system. USPTO 
Published Patent Application US2004/0250138, Filing Date: 18 April 2003. 

[218] Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and code in C (2nd ed.). 
New York City, New York, USA: John Wiley & Sons. 

[219] Schneier, B. (2006, December 14). MySpace passwords aren't so dumb, [Online] . Wired 
News. Available: 
http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300 [2008, 
June 11]. 

[220] Schneier, B. (2007, January 11). Secure passwords keep you safer, [Online] . Wired News. 
Available: 

http://www.wiredcom/politics/security/commentary/securityniatters/2007/0 1/72458 [2008, 
June 11]. 

[221] Silverman, J. H. (1986). The arithmetic of elliptic curve. New York, NY, USA: Springer- 
Verlag New York, Inc. 

[222] Simmons, G. J. (1984, April 9-1 1). The subliminal channel and digital signatures. 

Proceedings of the Advances in Cryptology (EUROCRYPT ( 84) (aka Proceedings of the 
Workshop on the Theory and Application of Cryptographic Techniques 1984), LNCS z09, 
Paris, France, 364-378. 



118 



[223] Simmons, G. J. (1998, May). The history of subliminal channels. IEEE Journal on Selected 
Areas in Communications, 76(4), 452-462. 

[224] 新加坡 女郎 患 湿 疫无指 纹纹机 场通关 检查花 45 分 鐘 [Singaporean Female having eczema 
has no ringerpnnt spending 43 minutes to get through the airport immigration of rice] . (2008, 
August 22-23). 星 洲 曰 报 [Sin Chew Daily], [Online], p. 17. Available: 
http://search.sinchew-i.com/node/192066 [2008, September 1]. 

[225] Spafford, E. H. (1993). What is a Ph.D. dissertation?, [Online]. Available: 
http://spaf.cerias.purdue.edu/~spaf/Archive/spaf.html [2008, August 2]. 

[226] S tailings, W. (2000). Network security essentials: Applications and standards. Upper Saddle 
River, New Jersey, USA: Prentice Hall. 

[227] S tailings, W. (2006). Cryptography and network security: Principles and practices (4th ed). 
Upper Saddle River, NJ, USA: Pearson Prentice Hall. 

[228] Standing, L. (1973, May). Learning 10,000 pictures. Quarterly Journal of Experimental 
Psychology, 25(2), 207-222. 

[229] Standing, L., Conezio, J., and Haber, R. (1970). Perception and memory for pictures: Single- 
trial learning of 2500 visual stimuli. Psychonomic Science, 79(2), 73-74. 

[230] Suo, X., Zhu, Y., and Owen, G. S. (2005, December 5-9). Graphical passwords: A survey. 

Proceedings of the 21st Annual Computer Security Applications Conference 2005 (ACS AC 
2005), Tucson, Arizona, USA, 463-472. 

[231] Swanson, M. D., Kobayashi, M., and Tewfik, A. H. (1998, June). Multimedia data- 
embedding and watermarKing techniques. Proceedings of the IEEE, 86(6), 1064-1087. 

[232] Tai, ᄂ. L. (2001, December 25). Dual in-line type finger-actuated switch. USPTO Issued 
Patent US6333479, Filing Date: 4 January 2001, Issue Date: 25 December 2001. 

[233] U.S. Department of Defense. (1985). Password management guideline (Report No. CSC- 
STD-002-85) Fort George G. Meade, Maryland, USA: DoD Computer Center. 

[234] Vacca, J. R. (2007, March 16). Biometric technologies and verification systems. Oxford, 
Oxfordshire, UK: Butterworth-Heinemann, p. 280. 



119 



[235] Wailgum, T. (2008, September 8). Password brain teaser: Too many passwords or not 
enough brain power?, [Online] . CIO.com. Available: 

http://www.cio.com/article/print/448241 [2008, September 10]. 



[236] Wang, X. L. [王 学理], and Pei, D, Y. [裴定 一]. (2006). 栖圆 与超栖 圆曲线 公铜密 码的理 
论与 头 现 [Theory and implementation of elliptic curve and hyperelliptic curve 
cryptography]. Beijing [北京], China [中国]: Science Press [科学 出版社], (in Chinese 
language). 

[237] Weinshall, D., and Kirkpatrick, S. (2004, April 24-29). Passwords you'll never forget, but 
can't recall. Proceedings of the ᄂ onference on Human Factors in Computing Systems 2004 
(CHI 2004), Vienna, Austria, 1399-1402. 

[238] Wiener, M. J. (1990, May). Cryptanalysis of short RSA secret exponents. IEEE Transactions 
on Information Theory, 36(3), 553-558. 

[239] Wikipedia Contributors. (2008a, July 22). List of languages by number of native speakers, 
[Online] . Wikipedia the Free Encyclopedia. Available: 

http://en. wikipedia. org/w/index.php?title=List_of_languages3y_number_of_native_speaker 
s&oldid=22 7 300820 [2008, July 23]. 

[240] Wikipedia Contributors. (2008b, August 27). Writing system, [Online] . Wikipedia the Free 
Encyclopedia. Available: 
http://en.wikipedia.Org/w/index.php ?title=Writing_system&oldid=234534887 [2008, 
September 1]. 

[241] Williams, L. C. (2002). A discussion of the importance of key length in symmetric and 
asymmetric cryptography, [Online] . Bethesda, Maryland, USA: SANS Institute. Available: 
http://www.giac.org/practical/gsec/Lorraine_Williams_GSEC.pdf [2008, May 17]. 

[242] Wilson, A. L. (2008, June 11). Microsoft's CardSpace attacked by researchers, [Online] . 
CIO.com. Available: http://www.cio.com/article/print/39 1813 [2008, September 10]. 

[243] Windows Live ID (aka Microsoft Passport Network), [Online] . (No date). Available: 
http://www.passport.net [2008, July 16]. 



120 



[244] Witty, R. J. (2001, January 30). Best practices for managing PINs and passwords (Tech. Rep. 
No. Gartner QA-12-8664). Stamford, CT, USA: Gartner, Inc. 

[245] Wolfgang, R. B., Podilchuk, C. L, and Delp, E. J. (1999, July). Perceptual watermarks for 
digital images and video. Proceedings of the IEEE, 57(7), 1108-1126. 

[246] Wu, T. J. (2003, March 25). System and method for securely logging onto a remotely located 
computer. USPTO Issued Patent US6539479, Filing Date: 14 July 1998, Issue Date: 25 
March 2003. 

[247] Yan, J., Blackwell, A., Anderson, R., and Grant, A. (2004, September-October). Password 
memorability and security: Empirical results. IEEE Security and Privacy Magazine, 2(5), 25- 
31. 

[248] Yee, K. P., and Sitaker, K. (2006, July 12-14). Passpet: Convenient password management 
and phishing protection. Proceedings of Symposium on Usable, Privacy and Security 
(SOUPS2006), Pittsburgh, PA, USA, 32-43. 

[249] Zhu, Y. F. [祝跃 飞], and Zhang, Y. J. [张亚 娟]. (2006, October). 補 圆曲线 公 f 月 密码导 引 
[Guide to elliptic curve cryptography] . Beijing [北京], China [中国]: Science Press !/!^쿠 出 
版 社], (in Chinese language). 



121 



ACRONYMS 



2D Two-dimensional 

2TDEA 2 -Key Triple Data Encryption Algorithm 

3TDEA 3 -Key Triple Data Encryption Algorithm 

2TDES 2 -Key Triple Data Encryption Standard 

3TDES 3 -Key Triple Data Encryption Standard 

A-Level Advanced Level 

ACM Association for Computing Machinery 

AD anno domini in Latin language, meaning the Christian era 

AES Advanced Encryption Standard 

AIPO/OAPI African Intellectual Property Organization 

(Organisation Africaine de la Propriete Intellectuelle) 

ANN Artificial Neural Network 

ANN Based BAP Artificial Neural Network Based Byzantine Agreement Protocol 

APA American Psychological Association 

APWG Anti-Phishing Working Group 

ARIPO African Regional Industrial Property Organization 

ASCII American Standard Code for Information Interchange 

AUTM Association of University Technology Managers 

BAP Byzantine Agreement Protocol 

BAP -ANN Byzantine Agreement Protocol with Artificial Neural Network 

BGP Byzantine Generals Problem 

BTIRDM Budapest Treaty on the International Recognition of the Deposit of Microorganisms 

for the Purposes of Patent Procedure 

CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart 

Cat. Category 

CII Computer-Implemented Invention 

CIS Cryptography & Information Security 

CLJ Crime, Law, and Justice 

CLPP Chinese Language Passphrase 

CLPW Chinese Language Password 

CM Communication Management 

CO Central Office 

CPG Compass Password Generator 

CRPP Center for Research and Postgraduate Programmes, now called IPS, MMU. 

CSPRNG Cryptographically Secure Pseudo-Random Number Generator 

DC Direct Current 



122 



DES Data Encryption Standard 

DHCP Dynamic Host Configuration Protocol 

DIL / DIP Dual In-Line Package 

DNS Domain Name System 

DNSSEC Domain Name System Security Extensions 

DSA Digital Signature Algorithm 

DSS Digital Signature Standard 

DSS Dynamic Security Skins 

EAPO Eurasian Patent Organization 

ECC Elliptic Curve Cryptography 

ECDSA Elliptic Curve Digital Signature Algorithm 

EMAIL Electronic Mail 

EPO European Patent Office 

ESP Extra-Sensory Perception 

EU European Union 

FAR False Acceptance Rate 

FCN Fully Connected Network 

FET Faculty of Engineering & Technology, MMU, Bukit Beruang, Melaka, Malaysia. 

FFC Finite Field Cryptography 

FOREX Foreign Exchange 

FRR False Rejection Rate 

FTP File Transfer Protocol 

FTPS FTP over SSL 

GCC Gulf Cooperation Council 

GCCPO Gulf Cooperation Council Patent Office 

GUI Graphical User Interface 

HDD Hard Disk Drive 

HMAC Keyed -Hash Message Authentication Code 

HTTP Hypertext Transfer Protocol 

HTTPS HTTP over SSL 

IACR International Association for Cryptologic Research 

IATUL International Association of Technological University Libraries 

IDC Identity-Based cryptography 

IEEE Institute of Electrical and Electronics Engineers, Inc. 

IEICE The Institute of Electronics, Information and Communication Engineers 

(電子 情報通信 学会) 

IETF Internet Engineering Task Force 

IFC Integer Factorization Cryptography 

IIP A International Intellectual Property Alliance 



123 



ILBS International Law Book Services 

IM Instant Messaging 

IMAP4 Internet Message Access Protocol version 4 

IP Intellectual Property 

IP Internet Protocol 

IPOS Intellectual Property Office of Singapore 

IPR Intellectual Property Right 

IPS Institute for Postgraduate Studies, previously called CRPP, MMU. 

IRC Internet Relay Chat 

ITRC Identity Theft Resource Center 

JPO Japan Patent Office (日本 経済 産業 省 特許/ f) 

LCD Liquid Crystal Display 

LPWA Lucent Personal Web Assistant 

LSB Least Significant Bit 

mA milli-ampere 

MAC Message Authentication Code 

MCMC Malaysian Communications and Multimedia Commission 

MDC Multimedia Development Corporation Sdn Bhd 

MDeC Multimedia Development Corporation Sdn Bhd 

MePKC Memorizable Public-Key Cryptography I Memorizable Public -Key Crypto system 

MIME Multipurpose Internet Mail Extensions 

MITM Man In The Middle 

MMU Multimedia University, which is a brand name of UTSB. 

mod modulus 

MoPKC Mobile Public -Key Cryptography 

MSB Most Significant Bit 

MSVS Microsoft Visual Studio 

MTSO Mobile Telephone Switching Office 

MY Malaysia 

MylPO Intellectual Property Corporation of Malaysia (Perbadanan Harta Intelek Malaysia) 

NBER National Bureau of Economic Research 

NIST National Institute of Standards and Technology 

nPDT n Poles Double Throw 

nPST n Poles Single Throw 

OAPI/AIPO Organisation Amcaine de la Propriete Intellectuelle 

(African Intellectual Property Organization) 

OS Operating System 

OSCAR Open System for CommunicAtion in Realtime 

(AOL Instant Messenger Protocol for ICQ and AIM) 



124 



OTP 


One-Time Password 


P-192 


192-bit Pseudo-Random Curve over Prime Field of ECC 


PAKE 


Password- Authenitcated Key Exchange 


PC 


Personal Computer 


PCB 


Printed Circuit Board 


PCPIP 


Paris Convention for the Protection of Industrial Property 


PCT 


Patent Cooperation Treaty 


PGP 


Pretty Good Privacy 


Ph.D. 


Doctor of Philosophy 


PKC 


Public-Key Cryptography 


PKC 


Public-Key Cryptosystem 


PLT 


Patent Law Treaty 


PNAS 


Proceedings of the National Academy of Sciences 


POP3 


Post Office Protocol version 3 


P.R.C. 


People's Republic of China (中华 人民 共和 国 ) 


PRNG 


Pseudo-Random Number uenerator 


PSTN 


Public Switched Telephone Network 


RFC 


Request for Comments 


RFID 


Radio Frequency Identification 


Rlogin 


Remote Login in UNIX Systems 


RNG 


Random Number Generator 


R.O.C. 


Republic of China (中華 民國) 


RSA 


Rivest-Shamir-Adleman Public-Key Cryptography 


S/MIME 


Secure 1 Multipurpose Internet Mail Extensions 


SATA 


Serial Advanced Technology Attachment 


SD 


Statutory Declaration 


Sdn. Bhd. 


"Sendirian Berhad" in Malayan language, i.e. private limited in English language. 


SFTP 


Secure FTP over SSH 


SHA 


Secure Hash Algorithm 


SHS 


Secure Hash Standard 


SIP 


Session Initiation Protocol 


SMTP 


Simple Mail Transfer Protocol 


SIPO 


State Intellectual Property of the P.R.C. ( 中华 人民 共和 国 国 家 知 识产权 局 ) 


SMS 


Short Message Service 


SNMP 


Si mnlp NTptwnrV iV/l ana CFPmpnt t-rntofnl 


SPC 


Strasbourg Patent Convention 


SPEKE 


Simple Password Exponential Key Exchange 


SPLT 


Substantive Patent Law Treaty 



125 



SP1 Service Pack 1 

SP2 Service Pack 2 

SP3 Service Pack 3 

SPP Single Password Protocol 

SRP Secure Remote Password Protocol 

SRP-6 Secure Remote Password Protocol version 6 

SSH Secure Shell 

SSL Secure Sockets Layer 

STPM Sijil Tinggi Persekolahan Malaysia (in Malayan language), Malaysia Higher School 

Certificate (in English language) 

TAC Transaction Authorisation Code or Transaction Authentication Code 

TAP Transaction Authorization Pin 

TELNET Telecommunication Network 

TIPO The Intellectual Property Office of Ministry of Economic Affairs, R.O.C. 

(中華 民 國經濟 部 智慧 財產 局) 

TLS Transport Layer Security 

TRIPS Agreement on Traae Related Aspects or Intellectual Property Rights 

TSIG Transaction SIGnature Protocol 

TSA Timestamping Authority 

TSP Time -Stamp Protocol 

TTP Trusted Third Party 

UI Utility Innovation 

UK United Kingdom 

UKCS UK Copyright Service 

UN United Nations 

UNESCOBKK UNESCO Bangkok 

UNODC United Nations Office on Drugs and Crime 

US United States 

USA United States of America 

USB Universal Serial Bus 

USCO US Copyright Office 

USCOC US Chamber of Commerce 

USPTO US Patent and Trademark Office 

UTSB Universiti Telekom Sdn. Bhd., Malaysia. 

V Volt 

WIPO World Intellectual Property Organization 

WM Watermarking 

WTO World Trade Organization 



126 



PUBLICATION LIST BY K.-W. LEE 

[1] Lee, K. W. (2008a, May 8). An improved dual in-line (DIL) switch for securing data 
communication and storage. Malaysia Application of Utility Innovation (aka utility model or 
small patent) UI 20070733, MylPO, Filing Date: 11 May 2007, Grant Date: 30 June 2010, 
Patent No.: MY-141830-A. 

[2] Lee, K. W. (2008b, May 8). An improved dual in-line (DIL) switch for securing data 
communication and storage. PCT Patent Application PCT/MY2008/000040, WIPO, Filing 
Date: 8 May 2008, Publication Date: 20 November 2008. 

[3] Lee, K. W. [李國 華]. (2008c, May 9). 應用於 保護 資料 通 訊 及存儲 安全 之 改良 

式隻 行 I 开 3 ^ [An improved dual in-line (DIL) switch for securing data communication and 

storage]. Taiwan (ROC) Patent Application TW097 117364, TIPO, Filing Date: 9 May 2008. 
(in Chinese language). 

[4] Lee, K. W. (2008h, July 25). Methods and systems to create big memorizable secrets and 
their applications in information engineering. Malaysia Patent Application PI 20082771, 
MylPO, Filing Date: 25 July 2008. 

[5] Lee, K. W. (2008k, December 10). Methods and systems to create big memorizable secrets 
and their applications in information engineering. Singapore Patent Application Su 
200809162-1, IPOS, Filing Date: 10 December 2008, Now Abandoned. 

[6] Lee, K. W. (20081, December 18). Methods and systems to create big memorizable secrets 
and their applications in information engineering. PCT Patent Application 
PCT/IB2008/055432, WIPO, Filing Date: 18 December 2008, Publication Date: 28 January 
2010. 

[7] Lee, K. W. (2009b, April). High-Entropy 2-Dimensional Key Input Method for Symmetric 
and Asymmetric Key Cryptosystems. International Journal of Computer and Electrical 
Engineering (IJCEE), 7(1), 1-8. 

[8] Lee, K. W. (2010b, September 15). Methods and systems to create big memorizable secrets 
and their applications in information engineering. Singapore Patent Application Su 
200809162-1, IPOS, Filing Date: 15 September 2010. 



127 



[9] Lee, K. W. (2010c, November 08). Methods and systems to create big memorizable secrets 
and their applications in information engineering. United States Patent Application US 
2011/0055585, USPTO, Filing Date (Completion): 08 November 2010. 

[10] Lee, K. W., and Ewe, H. T. (2006, November 3-6). Coinware for multilingual passphrase 
generation and its application for Chinese language password. Proceedings of the 2006 
International Conference on Computational Intelligence and Security (CIS 2006), 
Guangzhou, Guangdong, China, 1511-1514 (Part 2). 

[11] Lee, K. W., and Ewe, H. T. (2007, August). Multiple hashes of single key with passcode for 
multiple accounts. Journal of Zhejiang University Science A (JZUS-A), 5(8), 1183-1190. 



128