Page 30 - cdm-2014
P. 30
7kJhI83ke7
IJ48k4eRGe
I8Jjd4fGRr
uhgF6KFx23
9xDEo8nhg4
W59fkRF3ki
fi9JH3flco
jirKJ73hkd
59juHd4Rre
(In my word processor the grid is written in the Courier font so each character has the same
width)
You placed the erR4 starting in the bottom right corner (backwards).
You placed the 5jfW starting in the bottom left corner.
You placed the 5ff7 starting in the top left corner.
You placed the D7er starting in the top right corner. Clever.
Being careful you have several copies of the grid. Of course, you have to do this twice because
you have another 16 with symbols in.
There are problems. You cannot recreate your 16, which is why you created the grid on a sheet
of paper in the first place.
Let's think about the above grid. As you can see it's easier to memorize the positions of the 16
characters than it is to remember the 16 characters themselves. Therefore, we want a grid of
some kind.
Of course, we want to match the encryption strength of 62^20 since we can face people using
vast networks of supercomputers attempting all of the combinations. A true password encryption
system has to match the natural strength of whatever length the password is.
Another problem is that this password system will be the one you will use for the rest of your life
since you can only adopt one. To change from your current one to another you would have to
be assured that you were moving to one which is noticeably, noticeably, noticeably more
efficient. And none of the world's best chess players, mathematicians, physicists, computer
programmers and cryptographers have been able to tell you how to easily create a password
encryption system. Perhaps they are in the same situation you are?
! " $ !
! # ! "