2-Dimensional Key (2D key) and Multihash Key
Purpose of this File:
This file promotes the 2D key and multihash key.
To go back to the guide, click here.
Products for Sale in this File:
[1] Patent licensing of 2-dimensional key (2D Key).
[2] Patent licensing of multihash key.
[3] Copyrighted software and copyright licensing of 2-dimensional key (2D Key).
[4] Copyrighted software and copyright licensing of multihash key.
Introduction:
2D Key is a method and system to create big and yet memorizable secret beyond the current prior art technologies using the single-line password/key input field at 128 bits to 256 bits or more. Multihash Key uses key strengthening (aka hash iteration) and hash truncation to create multiple unique slave keys from a master key for both the offline and online accounts. The slave key from bigger hash iteration round has stronger security than the slave key from smaller hash iteration round. Consequently, the security, usability generally and memorizability particularly, can be improved by the hybrid combination of 2D Key and Multihash Key. For more information, please refer to the manual of this software. For a list matching the hash round/iteration number with the offline/online accounts, download here.
For private key optimization of 192-bit Mobile ECC software, when this software is used together with 2D key input method, there is a memory optimization to minimize the memorizable size of private key. Firstly, a 128-bit 2D secret is created using 2D key to act as the token password in the 2-factor multimedia key method. Secondly, an at least 192-bit multimedia data file can be used as software token to be encrypted and stored in a USB flash drive as token ciphertext. The token password (i.e. 2D key secret) and token plaintext, after the optional processes of multihash key, can generate a secret to act as a 192-bit private key secret in the 192-bit Mobile ECC. Whenever there is a need, get the USB flash drive storing the token ciphertext, decrypt it using the token password (i.e. 2D key secret), and select the hash iteration of multihash key to create a slave key.
To promote sale, agent(s), who can realize any sale contract and licensing agreement for the products and services in this business, will be compensated by a minimum commission rate of 2% throughout the validity of the business.
Intellectual Property:
[1] Kok-Wah Lee. (2008, July 25). Methods and systems to create big memorizable secrets and their applications in information engineering. Malaysia Patent Application PI 20082771, MyIPO, Filing Date: 25 July 2008.
[2] Kok-Wah Lee. (2009, March 14). Memorizable Public-Key Cryptography (MePKC) & Its Applications, First Edition (Version 1.0). Online public listing for archival on 14 March 2009. URL: http://www.archive.org/details/MemorizablePublic-keyCryptographymepkcItsApplications : <Click here> <Errata Sheet>
Download the Software:
Copyrighted Software | Feature | Fee (SGD$) | Payment |
[0] 2D Key PW5 2.0 Free Edition | 5 Slave Keys / 1 Master Key | Free | D0000: Obsolete. To be withdrawn from Internet by 31 Dec. 2010 |
[1] 2D Key PW100 3.0 Freeware Edition | 10*10 Slave Keys / 1 Master Key | Free | D0004: |
[2] 2D Key PW1000 3.0 Shareware Edition | 10*100 Slave Keys / 1 Master Key | 10 for 3 computers + 7% Tax | B0014: |