Comments on: How to remember a 128-bit key using ‘constrained choice’
You can submit a comment using the box below. You will be challenged with an arithmetic question but an email address is not required. This comment system does not use third-party providers or share data. It was custom-made for Clarion and runs entirely on the web server that hosts the site.
This article was published before the creation of the comment system in July 2020. By policy, comments will remain open without a time limit, based on the premise that good comments made years later can be valuable.
Comments (since July 2020)
- How to remember a provably strong password: a new way using ‘constrained choice’ July 2018, Stephen Hewitt. The 2nd Clarion data privacy article
- An idea for public key authentication from a name without certificates or central authority May 2021 Stephen Hewitt
- How to use beads to generate random letters and numbers by hand 22 September 2017, Stephen Hewitt. The first Clarion data privacy article
- Manual encryption with a one-time pad revisited March 2019, Stephen Hewitt. The 4th Clarion data privacy article
- A simple way to represent cryptographic key fingerprints 7 June 2020, Stephen Hewitt. The 5th Clarion data privacy article
- How to Memorize a Random 60-Bit String Marjan Ghazvininejad and Kevin Knight, 2015 (SHA256 of PDF f0e091f445a4f777b123d56153cf149552e51424493ddf276378a709cbf5d79c)