Page 22 - index
P. 22
What is Eternity 2? If all the pieces are arranged correctly then it is another flower. Apart
from its creators no one ever got to see it.
Passwords are not the same thing as data. They are more synonymous with the words
"infinite" and "hidden". On the other hand data (which can be encrypted by encryption
methods) is not infinite. It is known, which is not the same as thing as infinite. How can the
known be infinite? It cannot be.
The question is who in the world would need to create an encryption algorithm with infinitely
many wrong permutations? Mathematicians and cryptographers clearly don't, so why would
someone need to do it?
Ships have to be designed by naval architects. Racing cars have to be designed by racing-
car designers, on a drawing board or a computer. Computer processors have to be designed
by specialist electronics engineers. Password systems have to be designed by specialized
cryptographers. It just so happens that there's very few of us.
The method that I developed is just a piece of computer software with the human user
operating as a very basic supercomputer. Every good password encryption system would
have to operate on that same principle.
People can do certain things very well (compared with a computer) but other things very
poorly (compared with a computer). So we let the amazing formation of this super grid do all
of the hard work and let the user memorize all of the components which are needed for their
password, the easy part.
The paradoxical thing is that if you know what my system is it will look as if anyone in the
world could have created that because it looks so simple and correctly ordered. On the other
hand the user will have no doubt as to how secure it is.
Let's go further back in history. As every reader should know the Germans used the Enigma
ciphering machine during the Second World War. A booklet containing hundreds of
passwords was required to operate it and, of course, a different password was used daily.
As army units moved around one person was required to transport the machine and the
booklet. Over time the German cryptographers refined their methods.
There's nothing wrong with someone carrying a booklet. Do you agree?
We'll assume that their enemy has the use of a supercomputer beyond today and that it fits
inside a pocket. That supercomputer can try all those passwords in, say, 0.0000000000001
seconds if an army unit was to suffer a defeat.
So, how many attempts of a supercomputer does my password system require? 10^35
Constrained by the physical world there is a limit on how fast supercomputers will get. They
can't reach 10^35 but we don't know what technologies will emerge later. I heard of one
person who can use a computer to try passwords at the rate of 100,000,000,000 per second.
Attempts are already being made to build quantum computers.
How many different passwords does my system derive?
! " $
! # ! "