scispace - formally typeset
Search or ask a question

Showing papers on "Password published in 1974"


Journal ArticleDOI
TL;DR: A password scheme is presented which does not require secrecy in the computer and is based on using a function H which the would-be intruder is unable to invert.
Abstract: In many computer operating systems a user authenticates himself by entering a secret password known solely to himself and the system. The system compares this password with one recorded in a Password Table which is available to only the authentication program. The integrity of the system depends on keeping the table secret. In this paper a password scheme is presented which does not require secrecy in the computer. All aspects of the system, including all relevant code and data bases, may be known by anyone attempting to intrude.The scheme is based on using a function H which the would-be intruder is unable to invert. This function is applied to the user's password and the result compared to a table entry, a match being interpreted as authentication of the user. The intruder may know all about H and have access to the table, but he can penetrate the system only if he can invert H to determine an input that produces a given output.This paper discusses issues surrounding selection of a suitable H. Two different plausible arguments are given that penetration would be exceedingly difficult, and it is then argued that more rigorous results are unlikely. Finally, some human engineering problems relating to the scheme are discussed.

190 citations


Patent
19 Jul 1974
TL;DR: In this paper, a customer code word issuing machine is provided, where a customer manually inputs to the machine his secret password and displays his corresponding issued code word. But the machine does not provide a way for the user to change the password.
Abstract: A customer code word issuing machine is provided wherein a customer manually inputs to the machine his secret password. The machine encodes the password and displays his corresponding issued code word. A verification machine is provided which includes a dial or keyboard for manually inputting the customer's password and the issued code word. The verification machine encodes the inputted password to derive an output for comparison with the manually inputted code word to derive an output indicative of the truth or falseness of the match of the code word with the respective password. The verification machine may be employed to open a lock, to allow use of a credit card for a telephone call, purchase of goods, etc.

140 citations


Patent
11 Mar 1974
TL;DR: In this paper, the magnetic memory is provided with a unique password, and unless the correct password is present in the computer, or entered into the computer by the operator, the computer will not run and the memory cannot be altered.
Abstract: Manipulation of a digital computer magnetic memory is locked out to prevent unauthorized or accidental erasure. The memory is provided with a unique password. Unless the correct password is present in the computer, or entered into the computer by the operator, the computer will not run and the memory cannot be altered.

44 citations


01 Jan 1974
TL;DR: A feasibility study of a technique using a one-time password on a magnetic card as a means of user identification for computer terminal access using a PDP-11/20 computer is studied.
Abstract: : The report is a feasibility study of a technique using a one-time password on a magnetic card as a means of user identification for computer terminal access. A magnetic card reader/recorder was interfaced with a PDP-11/20 computer to provide a demonstration model. Interface logic diagrams and detailed description of the software used in the demonstration model are included. A method is shown for calculating the size of the major elements of the software required for implementation in any computer system. The report outlines some requirements of computer operation system in which identification feature is eventually used. (Author)

1 citations