Mnemonic Identity
Solutions Limited





Trial Course
Image-to-Code Conversion by Expanded Password System



You can experience the process of the on-the-fly image-to-code conversion by clicking 3 to 6 pictures of your choice and click ‘Enter’ button.”



Size:

First 50 Characters of Hash:














Output

What you see in “Code” box is the first 50 characters of the calculation result obtained by hashing the sum value of the identifier data of all the images that you picked up.

The identifier data of each image is obtained by hashing the picture data by Sha256 and the Code is obtained by hashing the sum of all the identifier data by Sha256 again and lastly it is hashed a final time with Argon2, the strongest password hashing algorithm. The whole output data, which is larger than 50 characters, can be used as an extremely strong password or as the seed of a cryptographic key.




Repeat the trial

Click ‘Reset’ button and you can repeat the process. Try the same set of pictures to confirm the same output obtained and/or other sets of pictures for different outputs. When the program is reset, the output will be deleted and will no longer physically exist but can be re-generated from your image memory as in the cases of commercial implementations.


Combination and Permutation

Picking up several images in combination (order/sequence does not matter) is known to be easier than the selection in permutation (order/sequence matters), although the mathematical strength is comparatively somewhat weaker. This trial course is designed for the selection in combination.


Mitigation of Threats

There are multiple ways to help prevent a bad guy from guessing, shoulder-surfing and trying brute force attacks for both online or offline implementation. When offered on the market, the product will come with a guideline on what sort of images are not recommended for use.


Merit of making use of episodic image memory

Embed the known (hard-to-forget) pictures of your episodic memory among unknown pictures and register them as your password (secret credential), you will be able to regenerate the same output at a very high probability even if you have not used this converter software for many months or even years.




< Wide choice of secret credentials >

We could opt to continue to use the remembered passwords as before, although the memory ceiling is very low. Most of us can manage only up to several of them.

We could opt to recognize the pictures remembered in stories where we want to reduce a burden of textual passwords. The memory ceiling is high, that is, we would be able to manage more and more of them.

Where we opt to make use of episodic image memory, we would only need to recognize the known hard-to-forget images. There is virtually no memory ceiling, that is, we would be able to manage as many passwords as we like, without any extra efforts.




< Which passwords correspond to which accounts? >

Being able to recall strong passwords is one thing. Being able to recall the correspondence between accounts and passwords is another.

When different sets of images are allocated to different accounts, those unique image matrices will be telling you which images you should pick up as your credential for this or that account.

When using hard-to-forget images of our episodic memories, Expanded Password System will free us from the burden of managing the relation between accounts and the corresponding passwords.