Page 23 - index
P. 23







It depends how you set it. Using the default method, 450,000. Using a small adjustment you
can easily go much higher, say, 10^14, although you can go higher than that. However, we'll
stick with the lowly 10^14. How many German booklets are needed to store all those
passwords?

We'll say that each booklet contains 40 pages and each page has 20 passwords, a total of
800. Dividing 10^14 by 800 gives 10^11.

How many people lived in Germany at the time? I don't know. We'll say 40 million. Let's
divide 10^11 by 40 million.

We get 4400. During the second world war every person in Germany would have to carry
4400 booklets had my system been around at the time.

My system was not designed for generating as many different daily passwords as possible.
(A different system would have been required for this.) It was designed to allow an individual
to obtain 450,000 (at most) different passwords for use in the different accounts that they
need passwords for, enough for one lifetime.
Let's suppose that your sheet of paper with the grid has been stolen. In fact this changes
absolutely nothing. All of their new supercomputers would have to try 10^35 combinations
whether it was stolen or not.

The idea is that you would use the grid to type in your passwords. You are not using the grid
because you have absolutely no idea how any of your passwords could have been created.
That knowledge has already been memorized in your head before you ever created your first
password. You would use the grid because you cannot clearly visualize every character
within it. You already have full knowledge of how to construct the grid again on another
sheet of paper.

The grid is a universal method of allowing a huge number of different passwords to be
constructed just like a computer keyboard is a method of allowing an infinite number of
different messages to be typed in.

What about AES?

Firstly, today's cryptographers have come a long way since the second world war.
Cryptography is something that goes on and on and it gets very complicated.

Some time ago the people at the American NIST (National Institute of Standards and
Technology) created a contest. They needed a data encryption algorithm which would use
key lengths of 128, 192 and 256 bits. Various teams of leading cryptographers around the
world submitted their algorithms and the winning design would be given the title "AES" (the
Advanced Encryption Standard, widely used in web browsers and encryption software
today).

Ten algorithms were eliminated at stage 1 and five progressed to stage 2: Twofish, Serpent,
MARS, RC6 and Rijndael.






! " $
! # ! "
   18   19   20   21   22   23   24   25   26   27   28