Let's first examine the domain name of our desired carrier "". Domain Based Saltįor this example, we will create a fictitious email address and generate our password using our algorithm at the following domain: Domain: Let's apply our new password generating skills to something practical. In this section I will explain strategies on how to generate passwords using domain specific data. Let's discuss a strategies on how we can create passwords in the real world. So now we can change plain text to cipher text in our heads. Single digit padding character: ?Īs show above, you can define your own rule set and salt your passwords as you like. Let's use the following characters and positions: 1. Now that we have a basic algorithm to obfuscate a simple text string. For example the number 1200308 will become "lcH". What if we have a combination of zeros "00"? A double zero will cancel out the capitalization. A zero will serve as a place marker for upper case. This points to the fact that a zero precedes the six in the number. Following this pattern we compute the following cipher text: "icdFem". The nine equates to the letter "i" and the three's alpha equivalent is "c". Since 93 this greater than 26, we need to split it once more into 9 and 3. That means, any number greater than 26 won't have any letters to assign it. For this number, we need to check if the number is greater than 26, because there are 26 letters in the English alphabet. In order to translate this number into alpha characters, we will split each number into smaller groups of two. Let's examine the following number: 93406513 Letters should likewise be translatable into their numeric counterparts. Let's mix it up and use the following characters and positions with the same string "seCreT": 1. Wait, who said this has to be a prefix? Let's change things up and make this prefix a suffix and change it to "&". In the previous example, we added an additional "0" to any letter that is uppercase. We can translate this string by adding an additional prefix to our cipher text: seCreT = 19050031805020 Let's spice things up and add uppercase letters. Additionally, this "padding" digit doesn't have to be "0". This padding digit separates single digits from their neighboring numbers. In order to differentiate single digit from double digit numbers, let's pad each single digit with a "0". Let's put all these numbers together into one string: 195318520Įventually and with enough practice, you will be able to discard the "EJOTY" sequence all together and be able to automatically remember the number which corresponds to the letter you wish to transform Character Prefixes and Suffixes We now have the following numbers: 19, 5, 3, 18, 5, 20 "t" is simple, it is directly part of the "EJOTY" sequence.Using the "EJOTY" sequence, we know that the letter "t" is the 20th letter in the alphabet. The letter "r" comes before the letter "t".Without much thought we can position it as the third letter and therefore equal 3. The letter "e" is easy, it is the first letter of the "EJOTY" sequence and therefore equals 5.The letter "s" comes right before the letter "t". Using the "EJOTY" sequence, We know that the letter "t" is the 20th letter in the alphabet. The letter "s" comes right before the letter "t".Mentally, we can calculate this in the following way: To illustrate this, let's convert the word "secret" into a number sequence. In this way, we can convert letters into numbers and numbers into letters. In other words, this sequence will function as a search index to help you remember the numerical position of each letter of the alphabet. In application, this sequence will be used to split the English alphabet into groups of five characters. Here's a mnemonic device to help you remember this sequence: Elton John Owns Two Yachts In order to get started, we will have to remember and memorize the following word "EJOTY". In short, the goal of this article is to help produce unique and strong passwords in you head which can later be recalled without external help. The examples are presented only as food for thought and can be used to help you create your own algorithm variant. We will conduct a case study and step through the process of creating and remembering strong passwords. Most importantly these passwords will be easily recalled with nothing more than your own gray matter. Let's create stronger passwords on the fly. In this article, we will discuss some suggestions on how to develop your own mental password generator. With that said, let's try to make things just a little less obvious. Disclaimer: I am not a cryptologist! With that said, I am making no assumptions that these algorithms are secure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |