Questions tagged [authentication]
The authentication tag has no summary.
18 questions
- Bountied 0
- Unanswered
- Frequent
- Score
- Trending
- Week
- Month
- Unanswered (my tags)
-1
votes
1
answer
96
views
(Zero-knowledge?) Proof of Connection
I have a conundrum to solve but am not knowledgeable enough about cryptography to know whether it's possible to do, and if so, what method to use.
I am a Provider and my task is to prove to some ...
2
votes
2
answers
144
views
What reason could a system have to limit the length of a password to 8 chars?
From time to time I see systems that don't allow passwords longer than 8 chars:
isn't that a security risk? What am I missing, here, that might have lead to such decision?
14
votes
9
answers
8k
views
Do passwords need a max length?
I understand that password storage generally uses hashing for security due to it being irreversible and that the stored hash is just compared to the hash of the password inputed by a user attempting ...
0
votes
1
answer
74
views
What is a Black Box attack against Machine Learning algorithms?
And is there an attack strategy that you can use to approximate the architecture of a machine learning system with the knowledge of class labels and some data points?
1
vote
0
answers
124
views
Non-Interactive Zero Knowledge Proofs: zk-snarks and zk-stark
I read up on an abstract example of ZKPs (the cave and the door), but I'm trying to understand NIZKs (specifically zk-snarks and zk-stark). All the examples I can find online seem to have some ...
1
vote
2
answers
170
views
Do ‘unspoofable’ email protocols exist?
Been getting a lot more spam lately and this question came to mind.
We already use SSL certificates to authenticate websites, can we do something similar for email?
If so, why do I still receive ...
0
votes
2
answers
45
views
How does storing encrypted password provide secure authentication?
It's universally accepted that storing an unencrypted password for automated authentication is a very bad idea, for the saved password can be used by malware, etc.
There is a number of systems that ...
2
votes
2
answers
388
views
Password authentication over an insecure connection
I was thinking a way to send password to server secure way without using secure connection,I found one solution.I want to find flaw in this.(Note: I am begginer,dont judge me, I know little about ...
1
vote
0
answers
233
views
why does message authentication using 2-universal family of hash functions require a prime number of possible hash values?
I am self-studying the book Intro to Algorithms 3ed by CLRS. One of the problems seems to give a piece of information that is not necessary, Problem 11-4 in the book states
Let H be class of hash ...
1
vote
0
answers
121
views
Can voice biometrics, (specifically voice recognition) application be used at windows logon screen? [closed]
I'm planning to develop an application in C# programming language for user authentication.
Target platform = Newer Windows versions such as Windows 8/10.
Your kind answers will be much appreciated. ...
4
votes
1
answer
151
views
How would P2P Kriegspiel be designed?
Kriegspiel chess is a variant of chess in which each player is not aware of where the opponent's pieces are. In a human match, a trusted intermediary relays piece losses, legality of moves etc. This ...
7
votes
2
answers
246
views
Zero-knowledge proof: Abstract example
So I was reading about ZKP on wikipedia, the abstract example in summary goes like this:
Peggy wants to prove to Victor that she knows the secret to a door inside a cave that connect A and B ...
2
votes
1
answer
174
views
User recognition through keystroke pattern
Hello thank you for taking time looking at this question. Is it possible to determine the keystroke patterns for a certain user?
My idea is that, when the user enters their username & password it ...
2
votes
1
answer
427
views
Can Eve impersonate Alice or Bob by using a replay attack?
For my computer science study, I have to design a replay attack (if possible) for the following authentication protocols.
I use the standard security protocol notation.
In these protocols, $A$ is ...
0
votes
1
answer
2k
views
Two Step Verification. 4 digits vs 6 digits
From a security level standpoint (such as Server, DataBase, Token Code, Authorization, Authentication, etc.) in regarding the Two Step Verification, usually Apple send a total of 4 digits security ...