Monthly Archives: June 2013

A suggested Diffie-Hellman key exchange design protocol

Despite the fact that it passes 3 times “in the clear,” the Diffie-Hellman key exchange is mathematically impossible to reverse engineer. Nevertheless, it becomes necessary to force any possible table look-up to become excessively unwieldy, before the key exchange is … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Secure email account recovery?

Conceptually, any way that a lawful owner can recover a password (after losing it,) offers some opportunity to a digital intruder to do the same. Two-factor authentication, such as Google’s Gmail offers, greatly assists in specifying the identity of a … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Can stolen passwords be proven to be tampered or stolen?

Passwords are by their nature unverifiable by eye-witness testimony. If a person had a password that they were obligated by law not to divulge, if it were stolen, would not be able to prove what it had been. Password theft … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment