‘Manual Attack’ as against ‘Automated Attack’

I was recently challenged with this question — “Selection of several images on a matrix of 36 images, for instance, would only give the level of mathematical strength that a long PIN provides. Is it any better than using long PINs?”

Our answer is “We could consider the threats of ‘visual-manual attacks on display’ and ‘automated attacks’ separately, say, we should be able to think of the measures to cope with them separately.

A figure of ’20-bit’, for instance, would be just a bad joke against automated attacks, whereas it would make a pretty tall wall against visual-manual attacks on display, particularly when the positions of images are shuffled on each trial.

Try the image-to-code conversion at our new website and you will see what kind of mathematical strength your image memory can generate/regenerate against automated attacks — https://www.mnemonicidentitysolutions.com/

Many more questions are answered in “Questions and Answers — Expanded Password System and Related Issues”

Key References

Account Recovery with Expanded Password System

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Additional References

Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.