[Download postscript version]
...Perrig
This publication was supported in part by Contract Number 102590-98-C-3513 from the United States Postal Service. The contents of this publication are solely the responsibility of the author and do not necessarily reflect the official views of the United States Postal Service.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...(PIN)
By secure passwords or secure PINs we mean strings which have no immediate meaning or relationship with the person. Therefore an attacker will have difficulties in guessing it.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...strings
We use meaningless from the point of view of the user. The hash value, or fingerprint of a public-key certificate has a purpose for the program, but no understandable meaning for the user.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...[#blum:bbs##1#].
The original Random Artversion used in this paper does not use this scheme, but it would be a simple addition.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...likely
This does not really hold for Random Art, but it gives an estimation of the lower bound.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Adrian Perrig
Wed Sep 15 15:31:30 PDT 1999