Confidentiality and security is one very important thing in the world of the internet, on data communications, personal accounts, etc., for the purpose of collective security, as well as for individual privacy. Internet users who want the privacy is not known by the parties concerned are not always trying to get around the way of securing the information to be communicated or to be stored. So that the protection of confidentiality and security be maintained.
Issues of confidentiality and security is of paramount importance in an organization and personally. Especially if it is a computer network connected to the public network. Of course, be very important, should not be seen or hijacked by unauthorized persons. Because if this happens the possibility of privacy which in turn could have even corrupted and can also be lost which would cause huge losses.
There are various types of existing encryption algorithms and cryptographic protocol used for secure password and data transfer etc. If you save and use the password in plain text it easily, there is the possibility of stolen passwords that lead to fake login and loss of privacy.
The authentication method is the most common computer with the username and password is alphanumeric. Alphanumeric passwords to be part of the authentication process for a very long time. Traditional alphanumeric passwords are vulnerable to many attacks. On the other hand, if the password difficult to guess, it may be difficult to remember.
One of the main problems in remembering the password is its length and the combinations used. Research has shown that many of the world's internet users tend to prefer short passwords or passwords that are easy to remember. It is a gap to be easily guessed or damaged. An attacker can guess the password by trying all possible combinations, which is not much for a short password. In addition, the attacker has advanced software that can guess the password average with great success.
An internet computer users may need a password for many things such use to log in to a personal account, personal account, access e-mail, databases, networks, websites, etc.
Security professionals often try to improve the system of password-based authentication in various ways to try to prevent password interception in transit and also techniques that are trying to stop an attacker use offline dictionary or brute-force attacks on passwords. This technique is not always effective.
By introducing the password policy, which forces users to change their passwords frequently and include additional complexity such as numbers and special characters, security professionals often forces the user to create a password creation strategy predictable.
Password authentication process that is most widely used on the Internet. But still, there are attacks that occur. The attackers can easily get a password for the user without the use of any password bruteforce are possible. With the knowledge of the user, an attacker can guess the password might like the child's name, your name, hobbies or date of birth.
To prevent the attack occurred, a password must be strong and not easily guessed by an attacker. Whether a strong password seen from a measure of how effectively the password is able to withstand the attack bruteforce and guessing. The more complicated, lengthy and not patterned, a password will have greater strength.
However, in general, greater strength make the password more difficult to remember. A difficult choice, if we do not remember the password that is held we could not use the service in question. In contrast with a password that is easy it would jeopardize the security of information and data that we store in the service.
Passphrase gives hope that promises to replace the usual password. Passphrase is usually quite long, because it is composed of several words, and also difficult to predict because of the words may not have meaning because it was taken using a random number.
What is Passphrase
Passphrase is a group of words and characters that you create to put forward an additional security and protection for those who have high yan activity.
Arnoud Engelfriet, seorangIT-lawyer, said that sebuha passphrase is a sentence or phrase that is used rather than a password. Because of its length, sebuh passphrase more secure than a password. And a passphrase remains easy to remember. A passphrase in general dalah a sentence or phrase that present a higher level of security compared to a password. Password generally only have six to eight characters long, and it is very unsafe.
Passphrase is different from passwords only in length. Passwords are usually short, six to ten characters. A short password that is OK to log into the computer system is programmed to detect several incorrect guesses and protect the stored passwords properly, but they are not safe to use with encryption systems. Passphrase is usually much longer - typically 12 to 40 characters, sometimes more. Greater length makes passphrases more secure. Modern passphrase was invented by Sigmund N. Porter in 1982.
Choosing a good passphrase is one of the most important things you can do to maintain the privacy of your computer data and e-mail messages. A passphrase should be:
• Only known to you.
• Long enough to be secure.
• It is difficult to guess.
• Easy to remember.
• Have a passwords management.
Tabula recta
Tabula recta is a term coined by Johannes Trithemius cryptography. In 1518. The tabula recta is a square table of letters, each one created with the previous shift to the left. Trithemius used to determine the tabula recta polyalphabetic cipher.
Tabul Recta often mentioned in discussing the pre-computer ciphers, including the Vigenere Cipher and Vigenere. All polyalphabetic based cipher Caesar cipher can be described in terms of tabula recta.
Tabula recta, square-shaped table which contains 26 letters of the alphabet the following 26 lines of additional letters, each shifted once to the left. Each alphabet is shifted one letter to the left of the one above it. These form 26 lines shifted letters, ending with Z.
In the case of encryption, Tabula Recta used to find keystream letters at the top and bottom left plaintext letter, and using letters Crossover as ciphertext letters.
Noting that the foregoing and phenomena that occur in generating a passwords and passphrases. I was thinking how to create passwords and passphrases that is safe, simple and well-ordered without having to guess randomly.
In this paper I develop a method how to create passwords and passphrases that in making the first use of a six-sided dice, both use some form of tabula recta or square table that contains any large and small letters and numbers, then do a little math calculations.
The first reason why the use of dice, because dice can be used for generating the numbers and dice always give a figure of mystery unexpected, the second reason the results of the dice can be integrated with (tabula recta) tables square numbers and uppercase and lowercase letters, then generate a password or passphrase very strong and qualified.
Prepare five dice, and a third table is the shape of the alphabet uppercase table, lowercase table and table numbers.
Issues of confidentiality and security is of paramount importance in an organization and personally. Especially if it is a computer network connected to the public network. Of course, be very important, should not be seen or hijacked by unauthorized persons. Because if this happens the possibility of privacy which in turn could have even corrupted and can also be lost which would cause huge losses.
There are various types of existing encryption algorithms and cryptographic protocol used for secure password and data transfer etc. If you save and use the password in plain text it easily, there is the possibility of stolen passwords that lead to fake login and loss of privacy.
The authentication method is the most common computer with the username and password is alphanumeric. Alphanumeric passwords to be part of the authentication process for a very long time. Traditional alphanumeric passwords are vulnerable to many attacks. On the other hand, if the password difficult to guess, it may be difficult to remember.
One of the main problems in remembering the password is its length and the combinations used. Research has shown that many of the world's internet users tend to prefer short passwords or passwords that are easy to remember. It is a gap to be easily guessed or damaged. An attacker can guess the password by trying all possible combinations, which is not much for a short password. In addition, the attacker has advanced software that can guess the password average with great success.
An internet computer users may need a password for many things such use to log in to a personal account, personal account, access e-mail, databases, networks, websites, etc.
Security professionals often try to improve the system of password-based authentication in various ways to try to prevent password interception in transit and also techniques that are trying to stop an attacker use offline dictionary or brute-force attacks on passwords. This technique is not always effective.
By introducing the password policy, which forces users to change their passwords frequently and include additional complexity such as numbers and special characters, security professionals often forces the user to create a password creation strategy predictable.
Password authentication process that is most widely used on the Internet. But still, there are attacks that occur. The attackers can easily get a password for the user without the use of any password bruteforce are possible. With the knowledge of the user, an attacker can guess the password might like the child's name, your name, hobbies or date of birth.
To prevent the attack occurred, a password must be strong and not easily guessed by an attacker. Whether a strong password seen from a measure of how effectively the password is able to withstand the attack bruteforce and guessing. The more complicated, lengthy and not patterned, a password will have greater strength.
However, in general, greater strength make the password more difficult to remember. A difficult choice, if we do not remember the password that is held we could not use the service in question. In contrast with a password that is easy it would jeopardize the security of information and data that we store in the service.
Passphrase gives hope that promises to replace the usual password. Passphrase is usually quite long, because it is composed of several words, and also difficult to predict because of the words may not have meaning because it was taken using a random number.
What is Passphrase
Passphrase is a group of words and characters that you create to put forward an additional security and protection for those who have high yan activity.
Arnoud Engelfriet, seorangIT-lawyer, said that sebuha passphrase is a sentence or phrase that is used rather than a password. Because of its length, sebuh passphrase more secure than a password. And a passphrase remains easy to remember. A passphrase in general dalah a sentence or phrase that present a higher level of security compared to a password. Password generally only have six to eight characters long, and it is very unsafe.
Passphrase is different from passwords only in length. Passwords are usually short, six to ten characters. A short password that is OK to log into the computer system is programmed to detect several incorrect guesses and protect the stored passwords properly, but they are not safe to use with encryption systems. Passphrase is usually much longer - typically 12 to 40 characters, sometimes more. Greater length makes passphrases more secure. Modern passphrase was invented by Sigmund N. Porter in 1982.
Choosing a good passphrase is one of the most important things you can do to maintain the privacy of your computer data and e-mail messages. A passphrase should be:
• Only known to you.
• Long enough to be secure.
• It is difficult to guess.
• Easy to remember.
• Have a passwords management.
Tabula recta
Tabula recta is a term coined by Johannes Trithemius cryptography. In 1518. The tabula recta is a square table of letters, each one created with the previous shift to the left. Trithemius used to determine the tabula recta polyalphabetic cipher.
Tabul Recta often mentioned in discussing the pre-computer ciphers, including the Vigenere Cipher and Vigenere. All polyalphabetic based cipher Caesar cipher can be described in terms of tabula recta.
Tabula recta, square-shaped table which contains 26 letters of the alphabet the following 26 lines of additional letters, each shifted once to the left. Each alphabet is shifted one letter to the left of the one above it. These form 26 lines shifted letters, ending with Z.
In the case of encryption, Tabula Recta used to find keystream letters at the top and bottom left plaintext letter, and using letters Crossover as ciphertext letters.
Noting that the foregoing and phenomena that occur in generating a passwords and passphrases. I was thinking how to create passwords and passphrases that is safe, simple and well-ordered without having to guess randomly.
In this paper I develop a method how to create passwords and passphrases that in making the first use of a six-sided dice, both use some form of tabula recta or square table that contains any large and small letters and numbers, then do a little math calculations.
The first reason why the use of dice, because dice can be used for generating the numbers and dice always give a figure of mystery unexpected, the second reason the results of the dice can be integrated with (tabula recta) tables square numbers and uppercase and lowercase letters, then generate a password or passphrase very strong and qualified.
Prepare five dice, and a third table is the shape of the alphabet uppercase table, lowercase table and table numbers.
Step 1 Took five six-sided dice (yes, the real actual physical dice) and roll them several times and wrote the numbers you get.
Example: You've roll five dice.
Example: You've roll five dice.
Column 10, Line 12 : 20
Column 17, Line 14
: 3
Note the figures in the table below :
Step 2 Took five six-sided dice (yes, the real actual physical dice) and roll them several times and wrote the numbers you get.
Example: You've roll five dice.
Example: You've roll five dice.
Step 3 Took five six-sided dice (yes, the real actual physical dice) and roll them several times and wrote the numbers you get.
Example: You've roll five dice.
Example: You've roll five dice.
Column 14, Line 10 : w
Column 16, Line 14 : c
Note lowercase in the table below:
Column 10, Line 12 : 20
Column 17, Line 14 : 3
Column 17, Line 13 : C
Column 8, Line 11 : R
Column 14, Line 10 : w
Column 16, Line 14 : c
The letters and numbers above should be prepared to become a passphrase or passwords. To compile do the following:
10 + 12 = 22 =20
17 + 14 = 31 =3
17 + 13 = 30 =C
8 + 11 = 19 =R
14 + 10 = 24 =w
16 + 14 = 30 =c
17 + 14 = 31 =3
17 + 13 = 30 =C
8 + 11 = 19 =R
14 + 10 = 24 =w
16 + 14 = 30 =c
Sort the results of the sum of largest to smallest or vice versa : R20wcC3
: 3Ccw20R
This method is very safe even exceed Dicewere and if the attacker knows
that you use to select your password, so many combinations of words and letters
in a passphrase that can be used. Security in this method is derived from a
large number of combinations of uppercase, lowercase letters and numbers that
the attacker must seek with great difficulty because of the combination.
Three forms of Tabula Recta contains 26 uppercase letters, 26 lowercase
26 points or (78 words), so if you choose a password 14 words, there are 78 x
78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 x 78 combinations.
There 308,549,209,196,654,470,906,527,744 possibility.
Of course, the 26 letters in the alphabet and numbers would be very
good. There are many ways to choose random letters. How strong this passphrase?
Well, of course this is a very strong possibility 650,190,514,836,423,600,000.
It would be very difficult for an attacker to carry out their activities.
Note: 1
1. If you want
to do more passphrases to eight roll can also be.
2. You do not
have to start from step 1, it can be done at random, because the end result of
the passphrase is compiled based on the largest number to the smallest and vice
versa.
3. Why I do not
use symbols such as!,? , Etc., because not all sites can receive the symbol.
4. You can
create your own table according to your wishes, but must be 26 characters.
5. Dicewere
passphrase method is not safe anymore to do, since the attacker can predict it.
6. The reason I
use the dice, is a number generated becomes a mystery, you do not know what
number generated from dice. Plus you use five dice that will be great.
7. A note
from the author, may have been someone or anyone who has had to make in this
article, or exact, I is not know, the account just write what's on my
mind.
Note: 2
1.
If you are using 5 dice, you
should use the formula 31- ( x1 + x2 + x3 + x4 + x5)
2.
If you use 4 dice, you should use the
formula 25 - ( x1 + x2 + x3 + x4 )
3.
If you are using 3 dice, you should use
the formula 19 - ( x1 + x2 + x3 )
The more you do the roll, for example roll 1, roll 2 to roll 10 or more you will get a passphrase quality and very strong.
The more you do the roll, for example roll 1, roll 2 to roll 10 or more you will get a passphrase quality and very strong.
4. Create
passwords and passphrases manually more awake, and anyone can do it wherever
they are, I do not know if you make the use of the site makes passwords or
passphrases, I think it is less secure and less well.
5. I made this
article to help anyone who wants to get better security without difficulty doing
so. After that you can do the management of your passwords or passphrases.
One form of the security and privacy are passwords and passphrases.
To make it happen we need a good passwords and passphrases, robust, secure and up to date.
We are ready to help you improve and strengthen the security you have.
We serve the manufacturing of various kind of passwords and passphrases with various kinds of characters with a method that combines dice and tabula recta.
As :
1. Figures.
2. Capital letters.
3. Lowercase.
4. Symbols.
5. Combined few others.
6. As well as other matters relating to passwords and passphrases.