How it works

From PasswordMaker

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
You provide PasswordMaker two pieces of information: a <i>master password</i> -- that one, favorite password you like -- and the [http://en.wikipedia.org/wiki/URL URL] of the website requiring a password (for internet applications without URLs, such as instant messaging, you can make up any URL you like; e.g., aolinstantmessenger.com).
+
You provide PasswordMaker two pieces of information: a ''master password'' -- that one, favorite password you like -- and the [http://en.wikipedia.org/wiki/URL URL] of the website requiring a password. For internet applications without URLs, such as [http://en.wikipedia.org/wiki/Instant_messaging instant messaging], you can make up any text [http://en.wikipedia.org/wiki/String_(computer_science) string] you like, e.g., "aolinstantmessenger.com", or "my-aol-im").
-
Through the magic of [http://www.webopedia.com/TERM/O/one-way_hash_function.html one-way hash algorithms], PasswordMaker calculates what is known as a [http://en.wikipedia.org/wiki/Cryptographic_hash_function digital fingerprint] - or hash - which can then be used as your password for the website.
+
Through the magic of your favorite [http://www.webopedia.com/TERM/O/one-way_hash_function.html one-way hash algorithm] (Passwordmaker currently supports [http://wiki.passwordmaker.org/index.php/FAQ#Which_hash_algorithms_are_supported.3F all of these]), PasswordMaker uses the ''master password'' and the URL (or the text [http://en.wikipedia.org/wiki/String_(computer_science) string]) that you provided, plus the [http://wiki.passwordmaker.org/index.php/FAQ#How_do_the_account-settings_and_algorithm_I_choose_work_together_to_generate_passwords.3F account settings as modified by you], to calculate what is known as a [http://en.wikipedia.org/wiki/Cryptographic_hash_function digital fingerprint] - or hash - which can then be used as your password for the website.
-
Although one-way hash algorithms have a number of interesting characteristics, the one capitalized on by PasswordMaker is that the resulting hash (password) "does not reveal anything about the input (your <i>master password</i>) that was used to generate it." [http://java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html#MessageDigest]  
+
Although one-way hash algorithms have a number of interesting characteristics, the one capitalized on by PasswordMaker is that the resulting hash (password) "does not reveal anything about the input (your <i>master password</i>) that was used to generate it.[http://java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html#MessageDigest]
In other words, if someone has one or more of your generated passwords, it is [http://www.certifyit.com/_Definitions.htm ''computationally infeasible''] for him to derive your master password or to calculate your other passwords. Computationally infeasible means even computers [http://krone.physik.unizh.ch/~stadel/zBox/ like this] won't help!
In other words, if someone has one or more of your generated passwords, it is [http://www.certifyit.com/_Definitions.htm ''computationally infeasible''] for him to derive your master password or to calculate your other passwords. Computationally infeasible means even computers [http://krone.physik.unizh.ch/~stadel/zBox/ like this] won't help!

Revision as of 16:58, 1 September 2007

You provide PasswordMaker two pieces of information: a master password -- that one, favorite password you like -- and the URL of the website requiring a password. For internet applications without URLs, such as instant messaging, you can make up any text string you like, e.g., "aolinstantmessenger.com", or "my-aol-im").

Through the magic of your favorite one-way hash algorithm (Passwordmaker currently supports all of these), PasswordMaker uses the master password and the URL (or the text string) that you provided, plus the account settings as modified by you, to calculate what is known as a digital fingerprint - or hash - which can then be used as your password for the website.

Although one-way hash algorithms have a number of interesting characteristics, the one capitalized on by PasswordMaker is that the resulting hash (password) "does not reveal anything about the input (your master password) that was used to generate it.[1]"

In other words, if someone has one or more of your generated passwords, it is computationally infeasible for him to derive your master password or to calculate your other passwords. Computationally infeasible means even computers like this won't help!

Security features offered by the Browser Extension version of PasswordMaker - such as the ability to automatically insert generated passwords into a web sites' password box, helps protect you from key-loggers and/or trojan horses that some "Black Hats" use to try to steal passwords. For more details, visit the FAQ.

What About Portability?

For times when you must use an unsupported browser or can't install the extension for some other reason, there's an online version which mimicks the extension and works in all browsers new and old. No downloads or installations are required.

Additionally, there is a stand-alone version for Windows, Linux and Mac desktops, as well as a command-line version that can be integrated with custom applications.

Lastly, there is a J2ME version for mobile phones and PDAs in the works, although there is little happening at the moment. If you are interested in seeing this implemented more quickly and are willing to sponsor its development, please add a post in the Forums and someone will get in touch with you to discuss terms.

Personal tools