> > > > I think you guys have lost track of the whole purpose of the
> > > > Turing number.  It is to prevent automated trials by ensuring that
> > > > a human being is there.  What you are proposing amounts to an
> > > > additional or longer passphrase and in no way excludes automated
> > > > trials any more than the simple number now being used.
> >
> > As Mr. Van den Berghe demonstrated, it's much more difficult to crack
> > than a longer passphrase.
>
> I won't argue the security/passphrase issues.  They have been hashed
> over on this list ad infinitum.  My point remains: the purpose of the
> Turing number is not security per se but to eliminate automated
> trials.  How well the turning number actually does this is
> irrelevant.  This proposal does not serve to advance that purpose.



Hi Craig, all,


My proposal eliminates automated trials very well because it makes them totally
useless.

That's basically the big advantage of the "2 hurdle" concept I am proposing.
I am not going to discuss passphrase issues, cryptocards, etc, which have probably
been discussed at nauseum already.
But I want to point out the big advantage of a 2 hurdle system.

Automated trials need only one thing to work: if you can make sufficiently much
attempts to crack a passphrase, you are bound to succeed after trying long enough
(which may be very long of course depending on the speed of your system).

With my proposal you cannot crack my account even if you have an infinitely fast
computer and as much time as you want.
Why?

The 1st hurdle to take is the original passphrase.
If you get that one right (after numorous attempts), you still have to take out
the 2nd hurdle : my turing return algorithm
On this second hurdle we can limit the number of attempts (e.g 2), that's what
makes this concept vastly supperior to a 1 hurdle system with a longer passphrase.

Let's look  at a few different possiblities from the hackers point of view:

Facing the 2 hurdles the hacker has to do automated bets on both the passphrase
and the turing return code (we assume here that the hacker has found a way to read
the turing number automatically, what is not very difficult to achieve).

Scenario 1: passphrase wrong, turing return wrong  -> the hacker gets a "failed
login" message.

Scenario 2: passphrase wrong, turing return correct -> the hacker gets a "failed
login" message. He has no way to know that he got the turing return code right.
The hacker can get the turing return code right many times, he doesn't know it..

Scenario 3: passphrase correct, turing return wrong -> the hacker gets a "failed
login" message. He has no idea that he guessed the passphrase correctly, so he
goes on trying with other passphrases and turing return codes. Optionally the user
of the account receives an automated email that his passphrase has been broken
once, this allows him to change it.

Scenario 4: the hacker gets the passphrase correct for a 2nd time (after many more
attempts), but very likely the turing return will be wrong again  -> the hacker
gets a "failed login" message. Again he has no idea that the passphrase has been
guessed correctly. Optionally the user of the account gets a second warning email
and again optionally the account can be locked for 24 hours.

Scenario 5: Once the account is locked for 24 hours, the hacker always receives a
"failed login" message even if he gives the passphrase and turing return code
correctly. So, again he does not realise that the account is locked because he
succesfully cracked the passphrase before.

As we can see the hacker is always in the dark about eventual partial succes.
That's how this system makes automated trials totally useless.
It is very unlikely that the automatic trial guesses the turing return code
correctly on the first 2 successes it gets on the passphrase. Eventually, after
enough trials, it will get both the passphrase and the turing return correct, but
it is almost certain that the account is locked already when that happens.
We can effectively make a fool proof system with this 2 hurdle concept.

An added bonus is that this system also offers protection when your passphrase is
stolen.


It does not really matter what is used as the 2nd hurdle, it can be a turing
return algorithm, a "what is the name of your pet animal?" kind question, or any
other intermediate security ,easy to remember, thing (we don't need very high
security on the 2nd hurdle because we have effectively limited the number of
succesful bets you can make here to 2)

I prefer the turing return algorithm, because it gives extra protection. You may
be looking over my shoulder when I key in the turing response, you probably still
cannot guess my algorithm.


As you can see, many advantages, without the need for a more complicated login or
remembering a 2nd passphrase.
You don't need any cryptocard or whatever. The cryptocard can be lost..
The turing return algorithm can be kept quite simple, so no need to write it down.
This means that , unless you can scan my brain (you could try with hypnosis...),
you cannot crack my account, even
if you know my passphrase and have a quantum computer.



Danny

http://two-cents-worth.com/?102468&EG




---
You are currently subscribed to e-gold-list as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]

Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold account(s) 
via the web and shopping cart interfaces to help thwart keystroke loggers and common 
viruses.

Reply via email to