Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 140789
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T07:40:20+00:00 2026-05-11T07:40:20+00:00

Brainstorming request I need an idea for an authentication algorithm with some unusual requirements.

  • 0

Brainstorming request

I need an idea for an authentication algorithm with some unusual requirements.

The algorithm would be used to verify that the sender of a message is legitimate.

Restrictions:

  1. The ‘transport layer’ is e-mail
    • the sender (‘Alice‘) is a human being
    • Alice only has access to a web browser and internet access (including a webmail account) as her tools; therefore she can’t do very complicated calculations
    • The receiver (‘Bob‘) is a computer with no direct access from the internet.
    • Bob has an email account that it checks periodically.
    • Bob can send email.
    • No sending info to a 3rd party: Alice and Bob can’t send any out-of-band info. Reading some publicly available info (such as the time from a time server) is ok.

Assumptions:

  • Alice can access some information locally: maybe she carries a notebook, or we could even assume her web mail account is hack-proof, therefore sensitive information can be stored there.
  • Alice and Bob can exchange sensitive information directly at a time prior to the authentication (private keys?)

Non-goals:

  • encoding of the actual payload of the message is not necessary.
  • speed/latency are not (big) issues

Some ideas to get you started:

  1. Plain old hard-coded password.
    Problems:

    • brute force attack (not likely)
    • eavesdroping possible if the communication is done in clear text, then replay attacks possible
  2. Simple algorithm based on current date/time
    Example: Alice adds the current date, hour and minute and sends the result as the auth token, which Bob can verify. Let’s assume that read-only access to a time server does not violate rule #7 (no 3rd party).
    Problems:

    • security through obscurity: the algorithm is somewhat safe only because it is not publicly available (well, it is now… oops!)
  3. Some sort of challenge-response mechanism – Alice sends a request for authentication, Bob replies with a challenge, Alice sends the expected response and the actual payload.
    What are the details of the mechanism? I don’t know 🙂

What can you think of? I’m hoping to see some creative answers 😉

Edit:

Maybe an example would make rule #3 clearer: let’s assume that Alice is using a proprietary closed-source device <cough> iPhone <cough> to access the Internet, or she is standing in front of a public internet kiosk.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-11T07:40:21+00:00Added an answer on May 11, 2026 at 7:40 am

    My idea of a human-friendly low-tech challenge-response mechanism:

    1. Bob changes the challenge every time he receives a valid message (for example he makes a salted hash of the current time)
    2. every invalid message sent to Bob makes him reply with the current challenge, so Alice can query him by sending an empty mail
    3. once Alice knows the challenge, she goes to https://www.pwdhash.com/
      • in ‘Site Address’ she enters the current challenge
      • in ‘Site Password’ she enters her personal password (which is known to Bob)
      • PwdHash generates a ‘Hashed Password’
    4. Alice writes a message to Bob, using the hash just created as the subject
    5. Bob receives the message, hashes the current challenge and Alice’s password according to the PwdHash algorithm, and sees if his result matches the message subject
    6. if it does, Bob accepts the message and and sends out a confirmation containing the new challenge (essentially this is step 1)

    Advantages:

    • cheap & simple, may even run on reasonably modern mobile devices
    • human friendly (no math, easy to remember, prerequisites easily available on the net)
    • no replay attack possible
    • no clear text passwords over the wire
    • does not run out of passwords (like one-time pads do)
    • no inherent time limits (like RSA tokens have)
    • the PwdHash web site can be saved on disk and called locally, no third party dependency here

    Disadvantages:

    • Bob and Alice must pre-share a key (Alice’s password), therefore Alice cannot change her password off-site
    • compromising Alice’s password is the easiest attack vector (but that’s the case with almost all password protected systems)

    Note that PwdHash is an open hashing algorithm, Bob can easily implement it. The PwdHash web site works without post-backs, everything is client side JavaScript only, no traces left behind.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 112k
  • Answers 112k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer To state it different: Having a (complex) query with JOINs,… May 11, 2026 at 9:54 pm
  • Editorial Team
    Editorial Team added an answer Nope. In Java that static variable only gets initialized once.… May 11, 2026 at 9:54 pm
  • Editorial Team
    Editorial Team added an answer $(document).ready(function(){. $(".alphabet a").each(function(i){ if ($(".longlist ul li a[title^="+$(this).text()+"]").length < 1){… May 11, 2026 at 9:54 pm

Related Questions

Let's say I have DatabaseA with TableA, which has these fields: Id, Name. In
I have a 2 column table in a database 1,000 rows long(All integer data).
I am currently trying to create a menu system for a game and cannot
Satisficing (a portmanteau of satisfy and suffice) is a decision-making strategy which attempts to

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.