Using Chinese Characters To Generate Text-Based Passwords For Information Security

07/11/2019
by   Bing Yao, et al.
0

Graphical passwords (GPWs) are in many areas of the current world. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography, and they differ from the existing GPWs. A Topsnut-gpw consists of two parts: one is a topological structure (graph), and one is a set of discrete elements (a graph labelling, or coloring), the topological structure connects these discrete elements together to form an interesting "story". Our idea is to transform Chinese characters into computer and electronic equipments with touch screen by speaking, writing and keyboard for forming Hanzi-graphs and Hanzi-gpws. We will use Hanzigpws to produce text-based passwords (TB-paws). We will introduce flawed graph labellings on disconnected Hanzi-graphs.

READ FULL TEXT
research
07/26/2018

Topological Graphic Passwords And Their Matchings Towards Cryptography

Graphical passwords (GPWs) are convenient for mobile equipments with tou...
research
06/08/2018

Graph Theory Towards New Graphical Passwords In Information Networks

Graphical passwords (GPWs) have been studied over 20 years. We are motiv...
research
02/28/2016

Optimizing the Learning Order of Chinese Characters Using a Novel Topological Sort Algorithm

We present a novel algorithm for optimizing the order in which Chinese c...
research
09/13/2018

Text-based Passwords Generated From Topological Graphic Passwords

Topological graphic passwords (Topsnut-gpws) are one of graph-type passw...
research
09/04/2019

Topological Coding and Topological Matrices Toward Network Overall Security

A mathematical topology with matrix is a natural representation of a cod...
research
12/07/2022

Secure communication using low dimensional topological elements

Low-dimensional topological objects, such as knots and braids, have beco...
research
03/03/2020

Graphs and codes produced by a new method for dividing a natural number by two

In this paper, we introduce a new method which we call it MZ-method, for...

Please sign up or login with your details

Forgot password? Click here to reset