In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the...
64 KB (7,955 words) - 00:29, 5 June 2025
In cryptography, a zero-knowledge password proof (ZKPP) is a type of zero-knowledge proof that allows one party (the prover) to prove to another party...
3 KB (331 words) - 19:11, 3 June 2025
transmitting a password, or transmitting the hash of the password, password-authenticated key agreement systems can perform a zero-knowledge password proof, which...
79 KB (9,039 words) - 13:34, 24 June 2025
computational zero-knowledge without requiring interaction Zero-knowledge password proof, an interactive method for one party (the prover) to prove to...
727 bytes (137 words) - 19:37, 12 September 2021
effectively conveys a zero-knowledge password proof from the user to the server. In revision 6 of the protocol only one password can be guessed per connection...
28 KB (3,404 words) - 16:06, 8 December 2024
Cryptographic protocol Zero-knowledge proof Interactive proof system Topics in cryptography Zero-knowledge password proof Soundness (interactive proof) Shafi Goldwasser...
9 KB (1,635 words) - 20:12, 24 April 2025
of cryptography Zero-knowledge password proof Designed to be not encumbered by patents. Hao, Feng; Ryan, Peter Y. A. (2011). "Password Authenticated Key...
18 KB (1,849 words) - 15:04, 12 June 2025
challenge-response algorithms are: Zero-knowledge password proof and key agreement systems (such as Secure Remote Password (SRP)) Challenge-Handshake Authentication...
11 KB (1,540 words) - 09:38, 23 June 2025
card and initiates an exchange of messages that constitute a zero-knowledge password proof that the card is Peggy's. The building then allows Peggy to...
3 KB (322 words) - 18:19, 25 May 2025
amplify a shared password into a shared key, where the shared key may subsequently be used to provide a zero-knowledge password proof or other functions...
3 KB (389 words) - 16:17, 17 July 2022
Key-agreement protocol (section Passwords)
encapsulation mechanism Key management Password-authenticated key agreement Interlock protocol Zero-knowledge password proof Neural cryptography § Neural key...
12 KB (1,473 words) - 16:52, 18 June 2025
eavesdropper's hands. It can be seen as an authentication via a zero-knowledge password proof. Various 'augmented forms' of PAKE incorporate an oblivious...
29 KB (3,402 words) - 18:06, 8 June 2025
algorithm • Y-stations • Yuliang Zheng Zeroisation • Zero-knowledge password proof • Zero-knowledge proof • Zfone • Zodiac (cipher) • ZRTP • Zimmermann–Sassaman...
67 KB (2,932 words) - 23:20, 16 May 2025
together with the Zero-knowledge proofs (using for example Schnorr non-interactive zero-knowledge proof as specified in RFC 8235) for the proof of the exponents...
10 KB (1,501 words) - 14:33, 2 April 2025
full version of MD4 can be forged with this knowledge. These attacks do not contradict the security proof of HMAC, but provide insight into HMAC based...
18 KB (2,316 words) - 18:51, 16 April 2025
SQRL (category Password authentication)
pseudonymous zero-knowledge proof rather than providing a user ID and password. This method is thought to be impervious to a brute-force password attack or...
17 KB (1,477 words) - 11:31, 15 June 2025
that solves or mitigates the issues of traditional password-based authentication. Zero-knowledge proofs based on public-key signature schemes are used to...
30 KB (3,086 words) - 09:16, 9 June 2025
'theoretical'[clarification needed] cryptosystems include interactive proof systems, (like zero-knowledge proofs) and systems for secret sharing. Lightweight cryptography...
100 KB (11,007 words) - 01:11, 20 June 2025
Padding (cryptography) (section Zero padding)
small variations in payload size, such as plus or minus just one byte in a password-guessing attack for example. If the message sender is unlucky enough to...
23 KB (3,308 words) - 22:09, 21 June 2025
malware furthermore used a zero-day exploit in the WinCC/SCADA database software in the form of a hard-coded database password. Stuxnet's payload targets...
139 KB (12,053 words) - 12:30, 25 June 2025
keys to participants securely. It is also used in non-interactive zero-knowledge proof (zKP) protocols, specifically first generation zk-SNARK, as they...
14 KB (1,582 words) - 08:46, 25 May 2025
{\displaystyle h^{\alpha \beta ab(x-y)}=h^{0}=1} . This proves correctness. Zero-knowledge proof Markus Jakobsson, Moti Yung (1996). "Proving without knowing: On...
8 KB (1,153 words) - 04:01, 10 June 2025
Vault 7 (section Part 1 – "Year Zero")
Screwdriver malware that could use the Thunderbolt interface to bypass Apple's password firmware protection. On 31 March 2017, WikiLeaks published the third part...
90 KB (8,402 words) - 10:16, 25 June 2025
Alice and Bob (section Interactive proof systems)
genders are alternated: Alice, Bob, Carol, Dave, Eve, etc. For interactive proof systems there are other characters: The names Alice and Bob are often used...
24 KB (2,026 words) - 20:47, 18 June 2025
must use a unique 16-character alphanumeric password generated by Google instead of the user's normal password. Users who seek an even higher level of security...
13 KB (1,273 words) - 23:25, 9 June 2025
conflicted with the mechanism behind cryptographic zero-knowledge proofs. SpiderOak adopted the phrase "no knowledge" for their marketing. In November 2017, founder...
14 KB (1,214 words) - 08:59, 17 April 2025
on another device. Users have the option to set a two-step verification password and add a recovery email. In late 2022, options to Sign in with Apple and...
215 KB (19,289 words) - 07:28, 19 June 2025
the hash of the original password, which may or may not be trivial. Reversing password encryption (e.g. to obtain a password to try against a user's account...
50 KB (5,744 words) - 14:18, 17 March 2025
3×3×3 Rubik's Cube. Password strength: Usage of the 95-character set found on standard computer keyboards for a 10-character password yields a computationally...
117 KB (12,994 words) - 00:33, 11 June 2025