WO2021046063A1 - Human- and machine-readable cryptographic keys from dice - Google Patents
Human- and machine-readable cryptographic keys from dice Download PDFInfo
- Publication number
- WO2021046063A1 WO2021046063A1 PCT/US2020/048961 US2020048961W WO2021046063A1 WO 2021046063 A1 WO2021046063 A1 WO 2021046063A1 US 2020048961 W US2020048961 W US 2020048961W WO 2021046063 A1 WO2021046063 A1 WO 2021046063A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dice
- die
- grid
- arrangement
- cryptographic key
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 79
- 238000012545 processing Methods 0.000 claims description 33
- 230000008569 process Effects 0.000 claims description 19
- 238000001514 detection method Methods 0.000 claims description 8
- 238000012937 correction Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 12
- 230000008901 benefit Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 230000002093 peripheral effect Effects 0.000 description 6
- 241000282412 Homo Species 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000000007 visual effect Effects 0.000 description 4
- 210000003813 thumb Anatomy 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012015 optical character recognition Methods 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000002902 bimodal effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F9/00—Games not otherwise provided for
- A63F9/04—Dice; Dice-boxes; Mechanical dice-throwing devices
- A63F9/0413—Cuboid dice
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/38—Encryption being effected by mechanical apparatus, e.g. rotating cams, switches, keytape punchers
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F9/00—Games not otherwise provided for
- A63F9/04—Dice; Dice-boxes; Mechanical dice-throwing devices
- A63F9/0415—Details of dice, e.g. non-cuboid dice
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1004—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
- G06F11/1048—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices using arrangements adapted for a specific error detection or correction feature
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F9/00—Games not otherwise provided for
- A63F9/04—Dice; Dice-boxes; Mechanical dice-throwing devices
- A63F2009/0486—Dice with symbols, e.g. indicating a direction for moving a playing piece
- A63F2009/0488—Dice with symbols, e.g. indicating a direction for moving a playing piece with letters or words
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F9/00—Games not otherwise provided for
- A63F9/04—Dice; Dice-boxes; Mechanical dice-throwing devices
- A63F9/0495—Dice-boxes or similar storing means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- the presently described systems and methods relate generally to the field of cryptography, and more particularly, to providing systems and methods for providing human- and machine- readable cryptographic keys from dice.
- Password managers are often used today for generating passwords for users of computer systems. Password managers use “master passwords” to encrypt all of a user’s other passwords, as well as the user’ s two-factor authentication (“2FA”) codes and other secrets. Since password managers promise to manage all of this data for the user and to produce cryptographically strong passwords, they have been popular. The security requirements of password managers necessitate master passwords be long, unpredictable strings the user has never used before, in order to resist guessing attacks and other attempts to circumvent passwords. The downside to the use of master passwords as encryption keys is that if the user forgets or misplaces the master password, there is no way to recover the encryption key, and the user will lose access to their passwords and data.
- a common problem for users of password managers is that they do not use the master password for an extended period of time, eventually forget it, and cannot recover other passwords as a result.
- Memorable master passwords are too likely to be vulnerable to guessing attacks, whereas secure master passwords are too likely to be forgotten when users need them.
- the systems and methods described herein provide for human- and machine-readable cryptographic keys from dice.
- the system places a number of dice into an arrangement to fill a dice grid.
- the number of dice each contains a number of faces, and each of the faces of the dice includes an image.
- the system then captures, via a client device, an image of the arrangement.
- the system generates a cryptographic key from the captured image.
- This cryptographic key is a human-readable and machine-readable representation of the arrangement in a canonical sequence.
- the arrangement contains one or more of: a position of each die within the dice grid, an exposed face of each die with respect to the front of the dice grid, and/or an orientation of the exposed face of each die relative to a frame of reference. In some embodiments, the arrangement contains all of these aspects.
- the arrangement is generated via a random process.
- the arrangement of the dice grid is locked such that the arrangement cannot be altered.
- the cryptographic key includes one or more of: a binary representation of the arrangement, and a string representation of the arrangement.
- each image on the die faces includes one or more letters, numbers, and/or symbols associated with a portion of the cryptographic key.
- each image on the die faces comprises an overline and/or an underline representing a plurality of data bits associated with a portion of the cryptographic key.
- the canonical sequence is based on a set of rules determining at least: a starting die, an upright position for each die based on the image on the die face which is visible for that die, and a reading order from the starting die to an ending die.
- the dice grid is in the form of one of: a square or a rectangle.
- capturing the image of the arrangement includes capturing, with the client device, an image of the dice grid in the arrangement.
- the system sends, to the client device, a prompt for a user to manually identify or verify one or more visible images on the die faces exposed on the dice grid based on the captured image of the arrangement.
- the system performs one or more error detection checks based on the captured image of the arrangement.
- the cryptographic key can be put to various uses once generated.
- a secret is derived from the cryptographic key to seed an authenticator device or application running an authentication-based or cryptographic protocol.
- a password is derived from the cryptographic key (such as a master password).
- the system uses an application-specific cryptographic key derived from the cryptographic key in an end-to-end encrypted application as a primary authentication or encryption key or to back up a primary authentication or encryption key.
- the system uses an application programming interface (API) to enable a third-party application to derive keys or other secrets from the cryptographic key or perform operations with a derived cryptographic key without enabling access to the cryptographic key or the derived cryptographic key.
- API application programming interface
- the image on each of the die faces of the plurality of dice includes one or more text characters; and an encoding of data into a line below the text characters and a line above the text characters, such that the encoding in each individual line replicates the data in the text, and contains information sufficient to determine the size and position of both the location of the text and the other line.
- the encoding of data includes a number of 0 bits and 1 bits
- an error correction code is generated from the encoding of data, where the number of 0 bits and 1 bits in the encoding of data is constrained such that all possible encodings have a minimum number of 0 bits and 1 bits, and a grayscale threshold is exceeded for one or more of the 0 bits and 1 bits in order to identify the lines as black or white.
- an error correction code is generated from the encoding of data, where some of the 0 bits and 1 bits are inverted copies of other bits so as to catch all errors in which the 0 bits and 1 bits in a region of the encoding of data are either falsely set as 1 to 0 or cleared as 0 to 1.
- the dice may have an arbitrary number of die faces.
- any single-faced dice are flat and comprise a side with a face and a side without a face.
- any two-faced dice are flat and comprise two sides each having a face.
- any six-sided dice are represented as cubes with rounded comers.
- FIG. 1 A is a diagram illustrating an exemplary system for providing a cryptographic key from dice, in accordance with some embodiments.
- FIG. IB is a diagram illustrating an exemplary computer system for providing a cryptographic key from dice that may execute instructions to perform some of the methods therein.
- FIG. 2A is a flow chart illustrating an exemplary method for providing a cryptographic key from dice, that may be performed in accordance with some embodiments.
- FIG. 2B is a flow chart illustrating additional steps for providing a cryptographic key from dice.
- FIG. 3 is a diagram illustrating an example of a dice grid, in accordance with some embodiments of the present invention.
- FIG. 4A is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
- FIG. 4B is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
- FIG. 4C is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
- FIG. 5A is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5B is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5C is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5D is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5E is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5F is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 5G is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
- FIG. 6 is an example of error detection and correction during the process of providing a cryptographic key from dice, in accordance with some embodiments.
- FIG. 7 is a diagram illustrating an exemplary computer that may perform processing in some embodiments.
- steps of the exemplary methods set forth in this exemplary patent can be performed in different orders than the order presented in this specification. Furthermore, some steps of the exemplary methods may be performed in parallel rather than being performed sequentially. Also, the steps of the exemplary methods may be performed in a network environment in which some steps are performed by different computers in the networked environment.
- the cryptographic keys are fixed in a longer-lasting storage medium, namely, by virtue of using pre-printed images on mediums such as, e.g., plastic or metal, they may be less vulnerable to moisture and other elements than paper or other user-writable media.
- they provide much greater resilience to guessing attacks because they can be longer and more random than passwords that users must memorize.
- Human- and machine-readable cryptographic keys are also robust enough to be used in various contexts. For example, when paired with a dedicated device or app, they may be used to: generate passwords, such as a master password for a password manager service; seed FIDO or other security keys so that they can be replaced with cryptographically-identical replicas if lost; ensure continuity of access to data stored in an end-to-end encrypted application; and encrypt or decrypt data on behalf of third-party applications without revealing the keys to those third-party applications; or any other suitable context.
- passwords such as a master password for a password manager service
- seed FIDO or other security keys so that they can be replaced with cryptographically-identical replicas if lost
- ensure continuity of access to data stored in an end-to-end encrypted application and encrypt or decrypt data on behalf of third-party applications without revealing the keys to those third-party applications; or any other suitable context.
- FIG. 1 A is a diagram illustrating an exemplary environment in which some embodiments may operate.
- a dice grid 140 is connected to a processing unit 102.
- the processing unit 102 is optionally connected to one or more optional database(s) 150, including a die image database 130, captured image database 132, and rules database 134.
- One or more of the databases may be combined or split into multiple databases.
- the processing unit 102 is optionally connected to a client device 120 and third-party application server(s) 112.
- One or more of these components may be a computer system, part of a computer system, or hosted on a computer system.
- the exemplary environment 100 is illustrated with only one client device, processing unit, and dice grid for simplicity, though in practice there may be more or fewer client devices, processing units, and/or dice grids. In some embodiments, the client device and processing unit may be part of the same computer or device.
- the processing unit 102 may perform the method 200 or other method herein and, as a result, provide for cryptographic keys from dice (hereinafter “cryptographic keys” or “keys”). In some embodiments, this may be accomplished via communication with the client device 120, third-party application server(s) 112, and/or other device(s) over a network and one or more servers (e.g., application servers and/or network servers).
- the processing unit 102 is an application hosted on a computer or similar device, or is itself a computer or similar device configured to host an application to perform some of the methods and embodiments herein.
- the processing unit 102 is further configured to capture information from a physical dice grid 140.
- the processing unit 102 may have one or more cameras, scanners, sensors, and/or other built-in components configured to capture image(s) of the dice grid.
- Optional client device 120 is a device that sends and receives information to the processing unit 102.
- client device 120 is a computing device capable of hosting and executing one or more applications or other programs capable of sending and receiving information.
- the client device 120 may be a mobile device (such as, e.g., a smart phone or tablet), computer desktop or laptop, virtual reality or augmented reality device, wearable, or any other suitable device capable of sending and receiving information.
- the processing unit 102 may be hosted in whole or in part as an application executed on the client device 120.
- the client device may also be configured to interact with the dice grid 140 by capturing one or more images on the die faces exposed on the dice grid.
- client device 120 may have one or more cameras, scanners, sensors, and/or other built-in components configured to capture image(s) of the dice grid.
- Third-party application(s) 112 are applications from one or more third parties which are configured to communicate through or with the client device 120 and/or processing unit 102, and which may provide one or more functions while utilizing cryptographic keys generated from dice grids.
- the third-party application(s) 112 are hosted on the client device and/or one or more additional devices.
- third-party application(s) may communicate and interface with the processing unit 102 and/or client device 120 by an Application Programming Interface (API) or other means of interfacing.
- API Application Programming Interface
- the third-party application(s)l 12 may utilize and/or be hosted on one or more remote servers which connect to the processing unit 102 and/or client device 120.
- Optional database(s) include one or more of a die image database 130, captured image database 132, and/or rules database 134. These optional databases function to store and/or maintain, respectively, images on die faces exposed on dice grids, captured images of dice grids, and/or rules for generating cryptographic keys based on a canonical sequence. Other optional database(s) may be contemplated for other pieces of data throughout the system. In some embodiments, the optional database(s) can be queried by one or more components of system 100 (e.g., by the processing unit 102), and specific stored data in the database(s) can be retrieved.
- Dice grid 140 is a physical set of dice placed within a container which secures the dice in place in a certain configuration. The dice are placed in an arrangement to fill the dice grid 140. The dice each contain a number of faces (e.g., 6 faces per die), and each of the die faces on the dice contains an image visible on it.
- the dice each contain an equal number of faces (e.g., each die has exactly 6 faces), while in other embodiments the dice can contain an unequal or arbitrary number of faces relative to other dice (e.g., twelve dice may have 6 faces, six dice may have 9 faces, and nine other dice have 21 faces).
- any single-faced dice are flat and comprise a side with a face and a side without a face.
- any two-faced dice are flat and comprise two sides each having a face.
- any six-sided dice are represented as cubes with rounded comers.
- the dice grid 140 functions to provide a physical, fixed medium by which dice can be placed (e.g., via a random process such as a dice throw) into a sequence, with the visible images from the die faces being read by the processing unit in a particular canonical sequence in order to generate a cryptographic key.
- FIG. IB is a diagram illustrating an exemplary computer system that may execute instructions to perform some of the methods therein.
- the diagram shows an example of a processing unit 102 configured to provide a cryptographic key.
- Processing unit 102 may be an example of, or include aspects of, the corresponding element or elements described with reference to FIG. 1 A.
- processing unit 102 is a component or system on an enterprise server.
- processing unit 102 may be a component or system on client device 120, or may be a component or system on peripherals or third-party devices.
- Processing unit 102 may comprise hardware, software or both.
- processing unit 102 includes capture module 152, parsing module 154, sequence module 156, generation module 158, error detection module 160, and/or interfacing module 164.
- Capture module 152 functions to capture, and/or assist with capturing, visual images, visual information, and other data from a dice grid.
- capture module 152 can enable a client device, such as a smart phone, to take a picture of the dice grid with an image on each die face exposed and visible, and send the picture on to one or more components of the system for processing.
- Identifying module 154 functions to identify, recognize, parse, or otherwise understand (on a machine level and, optionally, human level) visual data from an image or other visual capture of the dice grid. For example, identifying module 154 can be configured to process an image on each die face visible on the dice grid in order to read into the system the data (e.g., alphanumeric and/or symbolic data) present on the image.
- Sequence module 156 functions to establish a canonical sequence by which the configuration of the dice in the dice grid are to be read by the processing unit.
- one or more rules in a rule set are used to establish the canonical sequence.
- Generation module 158 functions to generate a cryptographic key from the captured image of the arrangement and the identified images on the die faces exposed on the dice grid.
- Optional error detection module 160 functions to detect one or more errors during step(s) of the methods described herein. For example, error detection module 160 may detect an error in an inaccurate identification of an image, and then provide notification of the error to the system and/or proceed with an alternate method for identifying the image.
- Optional interfacing module 164 functions to interface with one or more third-party application servers, such as, e.g., via an API or other means of interfacing.
- FIG. 2A is a flow chart illustrating an exemplary method that may be performed in accordance with some embodiments.
- the flow chart shows an example of a process for providing a cryptographic key from a dice grid.
- these operations may be performed by a system including a processor executing a set of codes to control functional elements of an apparatus. Additionally or alternatively, the processes may be performed using special-purpose hardware. Generally, these operations may be performed in accordance with some aspects of the systems and methods herein. For example, the operations may be composed of various substeps, or may be performed in conjunction with other operations described herein.
- the system places a set of dice into an arrangement to fill a dice grid.
- the set of dice each contain an equal number of faces, and each of the die faces of the set of dice includes an image visible on the face that is facing outwards to the viewer of the dice grid.
- the arrangement contains: a position of each die within the dice grid; an exposed face of each die with respect to the front of the dice grid, and an orientation of the exposed face of each die relative to a frame of reference.
- the arrangement is generated or determined via a random process. For example, a user may throw the dice into a box for the dice grid, thus creating the random arrangement of the dice within the dice grid.
- FIG. 3 is a diagram illustrating an example of a dice grid 300, in accordance with some embodiments of the present invention.
- the embodiment in this example uses a set of 25 dice which are placed into a container (e.g., a box or any other suitable container, made of any suitable material) for the dice.
- a container e.g., a box or any other suitable container, made of any suitable material
- an arbitrary number e.g., 12, 20, 26, or any other suitable number of dice
- the box in the example is a 5x5x1 box with 25 slots for placing the 25 dice, such that the box appears in a square form.
- the box may be configured in any other suitable dimension with any other suitable number of slots for dice, including, for example, rectangular dimensions (e.g., 8x3x1) or even a straight line (e.g., 20x1x1).
- the box in the example exposes a 5x5 square grid of die faces, with one face 306 of each die exposed.
- Each face 306 of each die includes an image which is exposed and visible from the top of the dice grid. No other faces other than the one visible face are exposed for any given die placed in the dice grid.
- any die of any size or number of faces may be used, as long as the dice are all of the same size and the features are scaled proportionately.
- the images on each die face contain one or more letters, numbers, and/or symbols associated with a portion of the cryptographic key.
- each die face image contains two characters, a letter followed by a digit, which are sandwiched between a line below them (“underline”) and a line above them (“overline”).
- underline a line below them
- overline a line above them
- Each of the underline and overline represents a plurality of data bits (represented as, e.g., dots on the underline and overline) associated with a portion of the cryptographic key, which the system is configured to identify in a machine-readable fashion.
- the letter and digit are centered on the die, with the letter just left of center and digit just right of center, with a set amount of horizontal space between them.
- Each of the 25 dice in the example has a unique letter, with the same letter appearing on all six faces of a die.
- the 25 letters that uniquely identify each die are: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, R, S, T, U, V, W, X, Y, and Z.
- the six faces (i.e., sides) of every die are labeled with the digits: 1, 2, 3, 4, 5, and 6.
- the letter and digit may be engraved on the face of the die, overlaid on top of the die, printed or painted on the die, or otherwise present on the die.
- the underlines and overlines can be configured to establish orientation of the dice so that the processing unit 102 can determine which side is up and which character is a letter (e.g., the character just left of center) or a digit (e.g., the character just right of center).
- each letter/digit pair is sandwiched between an overline above it and underline below it.
- the overline and underline appear as rectangles.
- the system captures, via a client device, an image of the arrangement.
- the image is captured via a camera, such as a built-in camera of a smartphone or other mobile device.
- the image is captured via a scanner or other scanning device. Any other form of capturing an image may be contemplated.
- the captured image is such that the side of the dice grid with the exposed die faces is captured, not the other sides where the die faces are not exposed.
- the system processes the captured images to identify an image on the face of each die.
- the image may be identified, recognized, parsed, or otherwise determined in a machine-readable and/or human-readable way.
- OCR optical character recognition
- computer vision or other artificial intelligence techniques may be used in whole or in part.
- the system may ask users to manually verify or identify the results of the identification algorithm, particularly if there is a discrepancy between the different encodings used to identify the image of a given die face, e.g., the overline, the underline, and/or the human-readable characters.
- the system may prompt users to confirm what was identified, to do so for those dice on which the readings of the encodings (e.g., underline, overline, characters) did not match, or only when there is not a majority that match.
- an application using human- and machine-readable cryptographic keys from the methods herein may opt for more user confirmation when performing an operation in which a misread character will not be detected, such as encrypting data or storing a key, and require less confirmation when a failure will be detected if the key was misread (e.g., for a decryption or authentication operation) and that failure is unlikely to cause harm.
- the system generates a cryptographic key (or “key”) from the captured image and the identified images on the faces of each die, where the cryptographic key is a representation of the arrangement in a canonical sequence.
- keys which reflect human constructs and are often then used to derive other keys, may also be known as “seeds”.
- the canonical sequence is determined according to a set of rules for ordering the die in a particular sequence.
- the set of rules are capable of determining at least: a starting die within the dice grid; an upright position for each die based on the image exposed on the dice grid for that die; and a reading order from the starting die to an ending die within the dice grid.
- the rules for the canonical sequence can stipulate that the top left die of the dice grid is to be determined as the comer die with the letter character that is earlier in the alphabet than the letters on the three other corner dice. In the example of FIG. 3, between the comer dices B6, A5, El, and D2, the top left die is determined to be A5 as it contains the letter that is earliest in the alphabet. Adopting an orientation convention obviates the need to require that the box holding the dice have a physical orientation indicator, or a need for algorithms that read cryptographic keys to correctly recognize such an orientation indicator.
- the dice are then assigned indices from top to bottom, with each row ordered left to right.
- the canonical sequence may be such that the top row, starting with the top left die, is read from left to right, then the second row is read from left to right, and so on until the bottom right die is read as the last die in the canonical sequence.
- the orientation of each individual die face within the dice grid is represented as a digit from 0 to 3.
- a 0 indicates a die that is upright to the top of the dice grid.
- the digits 1-3 represent the number of 90-degree clockwise turns required to put an upright die into the correct orientation.
- 0 indicates the die is upright when the 5x5 grid is viewed at its canonical rotation; 1 indicates the die is facing right (1 turn clockwise 90-degree turn); 2 indicates the die is up-side down (2 turns, yielding 180 degrees); 3 indicates the die is facing left (3 turns clockwise 90 degrees, yielding 90 degrees counterclockwise).
- the cryptographic key is represented as a binary representation of the arrangement. This binary representation is efficient for transforming the cryptographic key into other representations, such as, e.g., hexadecimal digits, a QR code, a sequence of words, or any other suitable representation of the cryptographic key.
- the 25 dice in the dice grid have 6 25 possible sequences of digits, 4 25 possible sequences of orientations, and 25! possible orderings of the 25 letters.
- orientations 25 sum[i from 0...24] of orientation[i] * 4 (24_1)
- the cryptographic key can be represented in human-readable string form.
- a string-based representation of a cryptographic key can be easier for humans to read than a numeric form, and can allow for encodings of keys that are invalid in space-efficient form. For example, if a user constructs a cryptographic key from a set of non-unique dice, such as one with two T dice and no U die, the numeric or binary form cannot be used to encode the result.
- the cryptographic key’s string-based representation is a 75- character UTF8 string, made up of 25 3-character triples, each of which represents one die.
- the triples are ordered in the order of the dice in canonical form (index 0 to 24).
- the first two characters of each triple are the two characters that appear on the dice, from left to right.
- the first character of the triple is the letter that appears on the die.
- the second character of the triple is the printed digit that appears on the die, from T to '6'.
- the third character of the triple is the orientation, as character ⁇ ', 'G, 2', or '3', with each readable digit mapping to the numeric representation of orientation used in numeric form.
- this representation can also be used for variants that employ other character pairs to represent each die face (including, e.g., those from other languages).
- error checking and detecting are performed by the system based on the captured image of the arrangement.
- the lines above and below the characters in the images of the die face, i.e. the overline and underline, are configured to enable the system to detect and/or correct errors in identifying or recognizing the characters on the die faces.
- the underline and overline rectangles encode 11 bits of data into rectangles of height 0.5mm, which are white to represent 1 (one) bits or black (i.e., absent) to represent 0 (zero) bits.
- the leftmost bit is always white (1) and the rightmost bit is always black (0). This ensures that, no matter what angle the line appears in, the system can identify the left side of the line as the side with a white rectangle closest to the edge.
- the second leftmost rectangle is black (0) for underlines and white (1) for overlines.
- the remaining 8 rectangles encode a byte, with the most significant of the eight bits on the left (the third rectangle location) and the least significant bit on the right (the tenth rectangle location).
- the threshold can be calculated more reliably if the algorithm being used to calculate can assume there are least x black rectangles in a sample and y white rectangles in a sample. For the 11 -positions where white rectangles may occur on a line, it is required that at least four should be black and at least four should be white. Since all underlines and overlines have one white rectangle for orientation, and overlines have a second white rectangle to indicate they are overlines, the following are requirements for the underline and overline bytes: (1) all underline bytes must have between 3-6 one bits (2-5 zero bits), and (2) all overline bytes must have between 2-5 one bits (3-6 zero bits). Thus, samples of dice rectangles can be assumed to fit a bimodal distribution (around grayscale values for black and white rectangles) with at least four points at each mode.
- one aim is to minimize the chance that errors will lead the underline byte and overline byte to return the same wrong answer (the same incorrect letter/digit pair).
- the system can be configured to maximize the number of bits that must be read in error for such an error to occur.
- the 16-bit concatenation of the underline and overline bytes on each die face must be at least a hamming distance of four from that of every other die face.
- the underline and overline codes are generated based partly on techniques from Hamming(15, 11) codes, which encode 11 data bits with four parity bits. 8-bit messages are used (8 data bits), so the four parity bits of the hamming code are calculated with the last three data bits (d9-dl 1) set to zero.
- FIG. 2B is a flow chart illustrating additional steps for providing a cryptographic key from dice, in accordance with some embodiments. Step 208 is described above with respect to FIG. 2A.
- the system uses a secret derived from the cryptographic key to seed an authenticator device or application running an authentication-based or cryptographic protocol.
- FIGS. 4A, 4B, and 4C illustrate an example embodiment of using a secret derived from the cryptographic key to seed an authenticator device or application running an authentication- based or cryptographic protocol.
- a user can seed the keys they carry around with them, such that if the user loses or misplaces one, it can be replaced with a cryptographically identical replica.
- FIG. 4A a user operates a smartphone running an application labeled a “Companion App” for the dice grid.
- the application is configured to capture an image of the dice grid, identify the images on the die faces, generate a cryptographic key, derive a secret from the cryptographic key, and seed an authenticator device.
- the user is in the process of opening or unlocking the dice grid.
- the application has a user interface button for reading the dice grid.
- the smartphone additionally has an authenticator device connected via a cable.
- the authenticator device in this example is a FIDO-based token, but it can be a device running FIDO, WebAuthN, or any related authentication-based or cryptographic protocol.
- an authentication application instead of seeding an authenticator device, an authentication application is seeded.
- the secret is any machine-readable secret data which can be generated from the cryptographic key. For example, a sequence of words based on the cryptographic key may be a secret.
- the user has opened the dice grid and taken a picture of the dice grid using the smartphone’s built-in camera.
- the dice grid application then automatically identified the images on the die faces and displayed them on the smartphone screen.
- the user is now presented with user interface options to write the FIDO token, view the public key, or forget the dice grid.
- FIG. 4C the user has chosen the option to write the FIDO token.
- the screen displays a prompt to press the button on the FIDO token.
- the user presses the button on the FIDO token, which generates a secret which is derived from the cryptographic key, then seeds the FIDO token with the secret.
- the system alternatively or additionally generates a password derived from the cryptographic key.
- FIGS. 5A - 5F illustrate an example of using a cryptographic key to generate a password with a password manager.
- FIG. 5A illustrates an example of a user interface of a password manager.
- a user is asked to enter their email address, name, and a master password, then can click “submit” or “cancel” as needed.
- the master password rather than typing in a password manually, the user can click on “use your dice grid”.
- This link sends the user to a dice grid website or application, as shown in FIG. 5B.
- FIG. 5B illustrates a dice grid application and user interface. The screen reads, “May your password manager use your DiceKey [i.e., dice grid] to create a password? (Your password manager will not see your DiceKey)”. The user is then able to take a picture of the dice grid using the device’s built-in camera.
- FIG. 5B illustrates a dice grid application and user interface. The screen reads, “May your password manager use your DiceKey [i.e., dice grid] to create a password? (Your password manager will not see your DiceKey)”. The user is then
- FIG. 5C illustrates the user in the process of taking a picture of the dice grid with the built-in camera.
- FIG. 5D illustrates the system in the process of identifying the images on the die faces exposed on the dice grid, after capturing the image of the dice grid.
- FIG. 5E illustrates the dice grid application in a stage after it has completed the identification of the die faces, and has generated a cryptographic key. The user is given the option to send the password to the password manager. The user is also given the option to “open the dice grid” on the application itself.
- FIG. 5F illustrates the dice grid application when the user selects the option to open the dice grid. Upon clicking, the user is shown the dice grid with identified characters, overlines, and underlines as read in from the dice grid.
- FIG. 5G illustrates the user interface of the password manager after the master password has been generated based on the generated cryptographic key.
- a string of words has been generated as the master password, and has been derived from the cryptographic key.
- the system uses an application-specific cryptographic key, derived from the human- and machine-readable dice key, in an end-to-end encrypted application.
- the application-specific cryptographic key is used as a primary authentication or encryption key for the end-to-end encrypted application.
- the human- and machine-readable cryptographic key as read from the dice grid, can derive a primary encryption key used directly to encrypt the application’s data.
- the application creates its own primary authentication key, and encrypts that primary key with an application-specific cryptographic key derived from the human- and machine-readable key, allowing the primary key to be recovered by decrypting it with the human and-machine readable dice key in the future.
- the human- and machine- readable cryptographic key represented by the dice grid can be used to derive a public-private key pair for purposes of authentication.
- the process may be similar to or share elements with the process illustrated in FIGS. 5A - 5F and described above.
- the system uses an Application Programming Interface (API) to enable a third-party application to request the system to derive cryptographic keys or secrets, and to provide them to the application, or to request the system to perform cryptographic operations with derived secrets and to return the results to the application.
- API Application Programming Interface
- this is performed without the system enabling access by the third-party application to the human- and machine-readable cryptographic key or any derived keys.
- the process may be similar to or share elements with the process illustrated in FIGS. 5 A - 5F and described above.
- FIG. 6 illustrates an example of error detection and correction, in accordance with the described embodiments.
- the example shows a user attempting to take a picture of the dice grid in order for the system to capture an image of the dice grid.
- the underline for B6 which appears above the overline since the die is up-side down, is covered by the user’s thumb, but the camera appears to be able to see through the thumb to make out the outline of the underline.
- the algorithm has actually been able to read the overline (above the B6 on the logical die but below it in the frame), determine that it is in fact an overline (i.e., not an underline), then from that information and the dimensions and position of the overline, it extrapolates where the underline should be, and draws a red box there. It can then identify the “B6” based on reading the overline.
- the error detection of the system has used the underline and overline to detect the error and correct for it.
- FIG. 7 is a diagram illustrating an exemplary computer that may perform processing in some embodiments.
- Exemplary computer 700 may perform operations consistent with some embodiments.
- the architecture of computer 700 is exemplary.
- Computers can be implemented in a variety of other ways. A wide variety of computers can be used in accordance with the embodiments herein.
- cloud computing components and/or processes may be substituted for any number of components or processes illustrated in the example.
- Processor 701 may perform computing functions such as running computer programs.
- the volatile memory 702 may provide temporary storage of data for the processor 701.
- RAM is one kind of volatile memory.
- Volatile memory typically requires power to maintain its stored information.
- Storage 703 provides computer storage for data, instructions, and/or arbitrary information. Non-volatile memory, which can preserve data even when not powered and including disks and flash memory, is an example of storage.
- Storage 703 may be organized as a file system, database, or in other ways. Data, instructions, and information may be loaded from storage 703 into volatile memory 702 for processing by the processor 701.
- the computer 700 may include peripherals 705.
- Peripherals 705 may include input peripherals such as a keyboard, mouse, trackball, video camera, microphone, and other input devices.
- Peripherals 705 may also include output devices such as a display.
- Peripherals 705 may include removable media devices such as CD-R and DVD-R recorders / players.
- Communications device 706 may connect the computer 100 to an external medium.
- communications device 706 may take the form of a network adapter that provides communications to a network.
- a computer 700 may also include a variety of other devices 704.
- the various components of the computer 700 may be connected by a connection medium 710 such as a bus, crossbar, or network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The systems and methods herein provide for human- and machine-readable cryptographic keys from dice. In one embodiment, the system places a number of dice into an arrangement to fill a dice grid. The number of dice each contains a number of faces, and each of the faces of the dice includes an image. The system then captures, via a client device, an image of the arrangement. The system generates a cryptographic key from the captured image. This cryptographic key is a human-readable and machine-readable representation of the arrangement in a canonical sequence.
Description
HUMAN- AND MACHINE-READABLE CRYPTOGRAPHIC KEYS FROM DICE
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the benefit of U.S. Provisional Application No. 62/895,985, filed September 4, 2019, which is hereby incorporated by reference in its entirety.
FIELD
[1] The presently described systems and methods relate generally to the field of cryptography, and more particularly, to providing systems and methods for providing human- and machine- readable cryptographic keys from dice.
BACKGROUND
[2] Within the realm of cryptography, a major ongoing challenge is in providing encryption keys which are capable of cryptographically encrypting and securing data in a way that resists circumvention. The problem of creating secure passwords (e.g., for websites, local applications, accessing system administration privileges, or unlocking devices) is one such example where encryption keys play a significant role.
[3] Password managers are often used today for generating passwords for users of computer systems. Password managers use “master passwords” to encrypt all of a user’s other passwords, as well as the user’ s two-factor authentication (“2FA”) codes and other secrets. Since password managers promise to manage all of this data for the user and to produce cryptographically strong passwords, they have been popular. The security requirements of password managers
necessitate master passwords be long, unpredictable strings the user has never used before, in order to resist guessing attacks and other attempts to circumvent passwords. The downside to the use of master passwords as encryption keys is that if the user forgets or misplaces the master password, there is no way to recover the encryption key, and the user will lose access to their passwords and data. A common problem for users of password managers is that they do not use the master password for an extended period of time, eventually forget it, and cannot recover other passwords as a result. Memorable master passwords are too likely to be vulnerable to guessing attacks, whereas secure master passwords are too likely to be forgotten when users need them.
[4] Thus, there is a need in the field of cryptography for new systems and methods which provide for both human- and machine-readable cryptographic keys which provide secure encryption yet can still be read, understood, and retrieved by a human at a moment’s notice. The source of the problem, as discovered by the inventors, is a lack of generated cryptographic keys which can be read and understood by humans, are resilient to guessing attacks, and which allow for, e.g., error checking and other features of robust, cryptographically strong keys.
SUMMARY
[5] The systems and methods described herein provide for human- and machine-readable cryptographic keys from dice. In one embodiment, the system places a number of dice into an arrangement to fill a dice grid. The number of dice each contains a number of faces, and each of the faces of the dice includes an image. The system then captures, via a client device, an image of the arrangement. The system generates a cryptographic key from the captured image.
This cryptographic key is a human-readable and machine-readable representation of the arrangement in a canonical sequence.
[6] In some embodiments, the arrangement contains one or more of: a position of each die within the dice grid, an exposed face of each die with respect to the front of the dice grid, and/or an orientation of the exposed face of each die relative to a frame of reference. In some embodiments, the arrangement contains all of these aspects.
[7] In some embodiments, the arrangement is generated via a random process.
[8] In some embodiments, the arrangement of the dice grid is locked such that the arrangement cannot be altered.
[9] In some embodiments, the cryptographic key includes one or more of: a binary representation of the arrangement, and a string representation of the arrangement.
[10] In some embodiments, each image on the die faces includes one or more letters, numbers, and/or symbols associated with a portion of the cryptographic key.
[11] In some embodiments, each image on the die faces comprises an overline and/or an underline representing a plurality of data bits associated with a portion of the cryptographic key.
[12] In some embodiments, the canonical sequence is based on a set of rules determining at least: a starting die, an upright position for each die based on the image on the die face which is visible for that die, and a reading order from the starting die to an ending die.
[13] In some embodiments, the dice grid is in the form of one of: a square or a rectangle.
[14] In some embodiments, capturing the image of the arrangement includes capturing, with the client device, an image of the dice grid in the arrangement.
[15] In some embodiments, the system sends, to the client device, a prompt for a user to manually identify or verify one or more visible images on the die faces exposed on the dice grid based on the captured image of the arrangement. In some embodiments, the system performs one or more error detection checks based on the captured image of the arrangement.
[16] In varying embodiments, the cryptographic key can be put to various uses once generated. For example, in some embodiments, a secret is derived from the cryptographic key to seed an authenticator device or application running an authentication-based or cryptographic protocol. In some embodiments, a password is derived from the cryptographic key (such as a master password). In some embodiments, the system uses an application-specific cryptographic key derived from the cryptographic key in an end-to-end encrypted application as a primary authentication or encryption key or to back up a primary authentication or encryption key. In some embodiments, the system uses an application programming interface (API) to enable a third-party application to derive keys or other secrets from the cryptographic key or perform operations with a derived cryptographic key without enabling access to the cryptographic key or the derived cryptographic key.
[17] In some embodiments, the image on each of the die faces of the plurality of dice includes one or more text characters; and an encoding of data into a line below the text characters and a line above the text characters, such that the encoding in each individual line replicates the data in the text, and contains information sufficient to determine the size and position of both the location of the text and the other line. In some embodiments, the encoding of data includes a number of 0 bits and 1 bits, and an error correction code is generated from the encoding of data, where the number of 0 bits and 1 bits in the encoding of data is constrained such that all possible encodings have a minimum number of 0 bits and 1 bits, and a grayscale threshold is
exceeded for one or more of the 0 bits and 1 bits in order to identify the lines as black or white. In some embodiments, an error correction code is generated from the encoding of data, where some of the 0 bits and 1 bits are inverted copies of other bits so as to catch all errors in which the 0 bits and 1 bits in a region of the encoding of data are either falsely set as 1 to 0 or cleared as 0 to 1.
[18] In some embodiments, the dice may have an arbitrary number of die faces. In some embodiments, any single-faced dice are flat and comprise a side with a face and a side without a face. In some embodiments, any two-faced dice are flat and comprise two sides each having a face. In some embodiments, any six-sided dice are represented as cubes with rounded comers.
[19] The features and components of these embodiments will be described in further detail in the description which follows. Additional features and advantages will also be set forth in the description which follows, and in part will be implicit from the description, or may be learned by the practice of the embodiments.
BRIEF DESCRIPTION OF THE DRAWINGS
[20] FIG. 1 A is a diagram illustrating an exemplary system for providing a cryptographic key from dice, in accordance with some embodiments.
[21] FIG. IB is a diagram illustrating an exemplary computer system for providing a cryptographic key from dice that may execute instructions to perform some of the methods therein.
[22] FIG. 2A is a flow chart illustrating an exemplary method for providing a cryptographic key from dice, that may be performed in accordance with some embodiments.
[23] FIG. 2B is a flow chart illustrating additional steps for providing a cryptographic key from dice.
[24] FIG. 3 is a diagram illustrating an example of a dice grid, in accordance with some embodiments of the present invention.
[25] FIG. 4A is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
[26] FIG. 4B is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
[27] FIG. 4C is an example of using a generated cryptographic key to seed an authenticator device, in accordance with some embodiments.
[28] FIG. 5A is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[29] FIG. 5B is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[30] FIG. 5C is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[31] FIG. 5D is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[32] FIG. 5E is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[33] FIG. 5F is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[34] FIG. 5G is an example of using a generated cryptographic key to generate a password, in accordance with some embodiments.
[35] FIG. 6 is an example of error detection and correction during the process of providing a cryptographic key from dice, in accordance with some embodiments.
[36] FIG. 7 is a diagram illustrating an exemplary computer that may perform processing in some embodiments.
DETAILED DESCRIPTION
[37] In this specification, reference is made in detail to specific examples of the systems and methods. Some of the examples or their aspects are illustrated in the drawings.
[38] For clarity in explanation, the systems and methods herein have been described with reference to specific examples, however it should be understood that the systems and methods herein are not limited to the described examples. On the contrary, the systems and methods described herein cover alternatives, modifications, and equivalents as may be included within their respective scopes as defined by any patent claims. The following examples of the systems and methods are set forth without any loss of generality to, and without imposing limitations on, the claimed systems and methods. In the following description, specific details are set forth in order to provide a thorough understanding of the systems and methods. The systems and methods may be practiced without some or all of these specific details. In addition, well known features may not have been described in detail to avoid unnecessarily obscuring the systems and methods.
[39] In addition, it should be understood that steps of the exemplary methods set forth in this exemplary patent can be performed in different orders than the order presented in this
specification. Furthermore, some steps of the exemplary methods may be performed in parallel rather than being performed sequentially. Also, the steps of the exemplary methods may be performed in a network environment in which some steps are performed by different computers in the networked environment.
I. Benefits
[40] Various embodiments of the systems and methods described herein can confer a number of benefits over the previous attempts to address the problems elucidated above. Similarly to passwords, the cryptographic keys generated by the systems and methods herein can be read and understood by both humans and machines. While these human- and machine-readable cryptographic keys share this similarity with passwords, they provide several benefits over passwords. First, in some embodiments, they are capable of providing error-checking to ensure, for example, that the key material is not being read or transcribed incorrectly. Second, the cryptographic keys are fixed in a longer-lasting storage medium, namely, by virtue of using pre-printed images on mediums such as, e.g., plastic or metal, they may be less vulnerable to moisture and other elements than paper or other user-writable media. Third, they provide much greater resilience to guessing attacks because they can be longer and more random than passwords that users must memorize.
[41] Human- and machine-readable keys generated via physical processes also present several benefits over other physical storage media for passwords and cryptographic keys. First, by nature of being human-readable, they can be replicated by humans for the purpose of making a backup, then the backup can be machine-verified because the replica is also machine- readable. Second, the medium is not an electronic device, and thus contains no circuits which
are prone to degradation over time. Third, the non-electronic nature of dice grids has the advantage of never becoming obsolete in ways that electronic devices (e.g., devices with firmware requiring regular updates) will eventually become.
[42] Human- and machine-readable cryptographic keys are also robust enough to be used in various contexts. For example, when paired with a dedicated device or app, they may be used to: generate passwords, such as a master password for a password manager service; seed FIDO or other security keys so that they can be replaced with cryptographically-identical replicas if lost; ensure continuity of access to data stored in an end-to-end encrypted application; and encrypt or decrypt data on behalf of third-party applications without revealing the keys to those third-party applications; or any other suitable context.
[43] The benefits elucidated above will be described in further detail throughout.
II. Exemplary Environments
[44] FIG. 1 A is a diagram illustrating an exemplary environment in which some embodiments may operate. In the exemplary environment 100, a dice grid 140 is connected to a processing unit 102. The processing unit 102 is optionally connected to one or more optional database(s) 150, including a die image database 130, captured image database 132, and rules database 134. One or more of the databases may be combined or split into multiple databases. The processing unit 102 is optionally connected to a client device 120 and third-party application server(s) 112. One or more of these components may be a computer system, part of a computer system, or hosted on a computer system.
[45] The exemplary environment 100 is illustrated with only one client device, processing unit, and dice grid for simplicity, though in practice there may be more or fewer client devices,
processing units, and/or dice grids. In some embodiments, the client device and processing unit may be part of the same computer or device.
[46] In an embodiment, the processing unit 102 may perform the method 200 or other method herein and, as a result, provide for cryptographic keys from dice (hereinafter “cryptographic keys” or “keys”). In some embodiments, this may be accomplished via communication with the client device 120, third-party application server(s) 112, and/or other device(s) over a network and one or more servers (e.g., application servers and/or network servers). In some embodiments, the processing unit 102 is an application hosted on a computer or similar device, or is itself a computer or similar device configured to host an application to perform some of the methods and embodiments herein. The processing unit 102 is further configured to capture information from a physical dice grid 140. This may include processing the dice grid to parse information, and potentially other steps as will be described further below. In some embodiments, the processing unit 102 may have one or more cameras, scanners, sensors, and/or other built-in components configured to capture image(s) of the dice grid.
[47] Optional client device 120 is a device that sends and receives information to the processing unit 102. In some embodiments, client device 120 is a computing device capable of hosting and executing one or more applications or other programs capable of sending and receiving information. In some embodiments, the client device 120 may be a mobile device (such as, e.g., a smart phone or tablet), computer desktop or laptop, virtual reality or augmented reality device, wearable, or any other suitable device capable of sending and receiving information. In some embodiments, the processing unit 102 may be hosted in whole or in part as an application executed on the client device 120. The client device may also be configured to interact with the dice grid 140 by capturing one or more images on the die faces exposed on
the dice grid. In some embodiments, client device 120 may have one or more cameras, scanners, sensors, and/or other built-in components configured to capture image(s) of the dice grid.
[48] Third-party application(s) 112 are applications from one or more third parties which are configured to communicate through or with the client device 120 and/or processing unit 102, and which may provide one or more functions while utilizing cryptographic keys generated from dice grids. In varying embodiments, the third-party application(s) 112 are hosted on the client device and/or one or more additional devices. In some embodiments, third-party application(s) may communicate and interface with the processing unit 102 and/or client device 120 by an Application Programming Interface (API) or other means of interfacing. In some embodiments, the third-party application(s)l 12 may utilize and/or be hosted on one or more remote servers which connect to the processing unit 102 and/or client device 120.
[49] Optional database(s) include one or more of a die image database 130, captured image database 132, and/or rules database 134. These optional databases function to store and/or maintain, respectively, images on die faces exposed on dice grids, captured images of dice grids, and/or rules for generating cryptographic keys based on a canonical sequence. Other optional database(s) may be contemplated for other pieces of data throughout the system. In some embodiments, the optional database(s) can be queried by one or more components of system 100 (e.g., by the processing unit 102), and specific stored data in the database(s) can be retrieved. In some embodiments, one or more of the optional databases (such as the scan database) are configured to encrypt or remove sensitive information after one or more given tasks are performed by the processing unit 102.
[50] Dice grid 140 is a physical set of dice placed within a container which secures the dice in place in a certain configuration. The dice are placed in an arrangement to fill the dice grid 140. The dice each contain a number of faces (e.g., 6 faces per die), and each of the die faces on the dice contains an image visible on it. In some embodiments the dice each contain an equal number of faces (e.g., each die has exactly 6 faces), while in other embodiments the dice can contain an unequal or arbitrary number of faces relative to other dice (e.g., twelve dice may have 6 faces, six dice may have 9 faces, and nine other dice have 21 faces). In some embodiments, any single-faced dice are flat and comprise a side with a face and a side without a face. In some embodiments, any two-faced dice are flat and comprise two sides each having a face. In some embodiments, any six-sided dice are represented as cubes with rounded comers. The dice grid 140 functions to provide a physical, fixed medium by which dice can be placed (e.g., via a random process such as a dice throw) into a sequence, with the visible images from the die faces being read by the processing unit in a particular canonical sequence in order to generate a cryptographic key.
[51] These components will be described in further detail with respect to the methods below and generally throughout.
[52] FIG. IB is a diagram illustrating an exemplary computer system that may execute instructions to perform some of the methods therein. The diagram shows an example of a processing unit 102 configured to provide a cryptographic key. Processing unit 102 may be an example of, or include aspects of, the corresponding element or elements described with reference to FIG. 1 A. In some embodiments, processing unit 102 is a component or system on an enterprise server. In other embodiments, processing unit 102 may be a component or system
on client device 120, or may be a component or system on peripherals or third-party devices. Processing unit 102 may comprise hardware, software or both.
[53] In the example embodiment, processing unit 102 includes capture module 152, parsing module 154, sequence module 156, generation module 158, error detection module 160, and/or interfacing module 164.
[54] Capture module 152 functions to capture, and/or assist with capturing, visual images, visual information, and other data from a dice grid. For example, capture module 152 can enable a client device, such as a smart phone, to take a picture of the dice grid with an image on each die face exposed and visible, and send the picture on to one or more components of the system for processing.
[55] Identifying module 154 functions to identify, recognize, parse, or otherwise understand (on a machine level and, optionally, human level) visual data from an image or other visual capture of the dice grid. For example, identifying module 154 can be configured to process an image on each die face visible on the dice grid in order to read into the system the data (e.g., alphanumeric and/or symbolic data) present on the image.
[56] Sequence module 156 functions to establish a canonical sequence by which the configuration of the dice in the dice grid are to be read by the processing unit. In some embodiments, one or more rules in a rule set are used to establish the canonical sequence.
[57] Generation module 158 functions to generate a cryptographic key from the captured image of the arrangement and the identified images on the die faces exposed on the dice grid.
[58] Optional error detection module 160 functions to detect one or more errors during step(s) of the methods described herein. For example, error detection module 160 may detect an error
in an inaccurate identification of an image, and then provide notification of the error to the system and/or proceed with an alternate method for identifying the image.
[59] Optional interfacing module 164 functions to interface with one or more third-party application servers, such as, e.g., via an API or other means of interfacing.
[60] The above modules will be discussed in further detail with respect to the steps of method 200 below.
III. Methods
[61] FIG. 2A is a flow chart illustrating an exemplary method that may be performed in accordance with some embodiments. The flow chart shows an example of a process for providing a cryptographic key from a dice grid. In some examples, these operations may be performed by a system including a processor executing a set of codes to control functional elements of an apparatus. Additionally or alternatively, the processes may be performed using special-purpose hardware. Generally, these operations may be performed in accordance with some aspects of the systems and methods herein. For example, the operations may be composed of various substeps, or may be performed in conjunction with other operations described herein.
[62] At step 202, the system (e.g., a user within the system) places a set of dice into an arrangement to fill a dice grid. In some embodiments, the set of dice each contain an equal number of faces, and each of the die faces of the set of dice includes an image visible on the face that is facing outwards to the viewer of the dice grid. In some embodiments, the arrangement contains: a position of each die within the dice grid; an exposed face of each die with respect to the front of the dice grid, and an orientation of the exposed face of each die
relative to a frame of reference. In some embodiments, the arrangement is generated or determined via a random process. For example, a user may throw the dice into a box for the dice grid, thus creating the random arrangement of the dice within the dice grid.
[63] FIG. 3 is a diagram illustrating an example of a dice grid 300, in accordance with some embodiments of the present invention. The embodiment in this example uses a set of 25 dice which are placed into a container (e.g., a box or any other suitable container, made of any suitable material) for the dice. In varying embodiments, an arbitrary number (e.g., 12, 20, 26, or any other suitable number of dice) can be used for the set of dice. The box in the example is a 5x5x1 box with 25 slots for placing the 25 dice, such that the box appears in a square form. In other embodiments, the box may be configured in any other suitable dimension with any other suitable number of slots for dice, including, for example, rectangular dimensions (e.g., 8x3x1) or even a straight line (e.g., 20x1x1). The box in the example exposes a 5x5 square grid of die faces, with one face 306 of each die exposed. Each face 306 of each die includes an image which is exposed and visible from the top of the dice grid. No other faces other than the one visible face are exposed for any given die placed in the dice grid. In some embodiments, any die of any size or number of faces may be used, as long as the dice are all of the same size and the features are scaled proportionately. In some embodiments, the images on each die face contain one or more letters, numbers, and/or symbols associated with a portion of the cryptographic key.
[64] In some embodiments, there may be a locking mechanism 304 which operates to latch the dice grid area 302 shut and lock it. In some embodiments, once the dice grid is locked, it cannot be reopened. In some embodiments, the dice grid may be unlocked via one or more unlocking processes, such as security measures or keys.
[65] In the example embodiment, each die face image contains two characters, a letter followed by a digit, which are sandwiched between a line below them (“underline”) and a line above them (“overline”). Each of the underline and overline represents a plurality of data bits (represented as, e.g., dots on the underline and overline) associated with a portion of the cryptographic key, which the system is configured to identify in a machine-readable fashion. The letter and digit are centered on the die, with the letter just left of center and digit just right of center, with a set amount of horizontal space between them. Each of the 25 dice in the example has a unique letter, with the same letter appearing on all six faces of a die. The 25 letters that uniquely identify each die are: A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, R, S, T, U, V, W, X, Y, and Z. The six faces (i.e., sides) of every die are labeled with the digits: 1, 2, 3, 4, 5, and 6. The letter and digit may be engraved on the face of the die, overlaid on top of the die, printed or painted on the die, or otherwise present on the die. Generally, the underlines and overlines can be configured to establish orientation of the dice so that the processing unit 102 can determine which side is up and which character is a letter (e.g., the character just left of center) or a digit (e.g., the character just right of center).
[66] As mentioned above, each letter/digit pair is sandwiched between an overline above it and underline below it. In some embodiments, the overline and underline appear as rectangles. The lines and their functions will be described in further detail below.
[67] Returning to FIG. 2, at step 204, the system captures, via a client device, an image of the arrangement. In some embodiments, the image is captured via a camera, such as a built-in camera of a smartphone or other mobile device. In some embodiments, the image is captured via a scanner or other scanning device. Any other form of capturing an image may be
contemplated. The captured image is such that the side of the dice grid with the exposed die faces is captured, not the other sides where the die faces are not exposed.
[68] At step 206, the system processes the captured images to identify an image on the face of each die. In various embodiments, the image may be identified, recognized, parsed, or otherwise determined in a machine-readable and/or human-readable way. In some embodiments, optical character recognition (“OCR”) and/or any other suitable character recognition techniques may be used. In some embodiments, computer vision or other artificial intelligence techniques may be used in whole or in part.
[69] In some embodiments, the system may ask users to manually verify or identify the results of the identification algorithm, particularly if there is a discrepancy between the different encodings used to identify the image of a given die face, e.g., the overline, the underline, and/or the human-readable characters. The system may prompt users to confirm what was identified, to do so for those dice on which the readings of the encodings (e.g., underline, overline, characters) did not match, or only when there is not a majority that match.
[70] In some embodiments, an application using human- and machine-readable cryptographic keys from the methods herein may opt for more user confirmation when performing an operation in which a misread character will not be detected, such as encrypting data or storing a key, and require less confirmation when a failure will be detected if the key was misread (e.g., for a decryption or authentication operation) and that failure is unlikely to cause harm.
[71] At step 208, the system generates a cryptographic key (or “key”) from the captured image and the identified images on the faces of each die, where the cryptographic key is a representation of the arrangement in a canonical sequence. Such keys, which reflect human constructs and are often then used to derive other keys, may also be known as “seeds”. In
some embodiments, the canonical sequence is determined according to a set of rules for ordering the die in a particular sequence. In some embodiments, the set of rules are capable of determining at least: a starting die within the dice grid; an upright position for each die based on the image exposed on the dice grid for that die; and a reading order from the starting die to an ending die within the dice grid.
[72] Regarding orientation of the dice in the grid in this example embodiment with 6-sided dice, four orientations for each die may be possible based on the captured image with the die faces exposed. In some embodiments, the rules for the canonical sequence can stipulate that the top left die of the dice grid is to be determined as the comer die with the letter character that is earlier in the alphabet than the letters on the three other corner dice. In the example of FIG. 3, between the comer dices B6, A5, El, and D2, the top left die is determined to be A5 as it contains the letter that is earliest in the alphabet. Adopting an orientation convention obviates the need to require that the box holding the dice have a physical orientation indicator, or a need for algorithms that read cryptographic keys to correctly recognize such an orientation indicator. In some embodiments, once the top left die has been determined, the dice are then assigned indices from top to bottom, with each row ordered left to right. In a 5x5 grid, the canonical sequence may be such that the top row, starting with the top left die, is read from left to right, then the second row is read from left to right, and so on until the bottom right die is read as the last die in the canonical sequence.
[73] In one example, the orientation of each individual die face within the dice grid is represented as a digit from 0 to 3. Based on the rules for canonical sequences, a 0 indicates a die that is upright to the top of the dice grid. The digits 1-3 represent the number of 90-degree clockwise turns required to put an upright die into the correct orientation. In other words: 0
indicates the die is upright when the 5x5 grid is viewed at its canonical rotation; 1 indicates the die is facing right (1 turn clockwise 90-degree turn); 2 indicates the die is up-side down (2 turns, yielding 180 degrees); 3 indicates the die is facing left (3 turns clockwise 90 degrees, yielding 90 degrees counterclockwise).
[74] In some embodiments, the cryptographic key is represented as a binary representation of the arrangement. This binary representation is efficient for transforming the cryptographic key into other representations, such as, e.g., hexadecimal digits, a QR code, a sequence of words, or any other suitable representation of the cryptographic key. In the example of FIG. 3, the 25 dice in the dice grid have 625 possible sequences of digits, 425 possible sequences of orientations, and 25! possible orderings of the 25 letters. Given an array of orientations represented as numbers 0 to 3, the numeric representation of all 25 orientations is: orientations25 = sum[i from 0...24] of orientation[i] * 4(24_1)
[75] The numeric representation of the 25 digits (die faces) showing is: digits25 = sum[i from 0...24] of digit[i] * 6(24_1)
[76] Given a function rank(letters, i), which returns the index of 1 etter[i ] in an alphabetically- sorted array of all characters excluding letter[0]...letter[i-l], the numeric representation of the 25 letters is: letters25 = sum[i from 0...23] of rank(letters, i) * (25-i)!
[77] In embodiments with 25 dice each with a unique letter, there is no need to encode the 25th letter (index 24) as its identity can be determined deductively, i.e., it is the letter that remains when removing the set of the first 24 letters from the alphabet of 25 possible letters. The numeric representation of a 5x5 grid of die faces is: key = ( ( (letters25 * 625) + digits25 ) * 425 ) + orientations25
[78] While there are over 2198 possible arrangements of 25 unique dice, only one fourth are in canonical form (with die 0 having the letter with a lower sort order than die 4, 20, and 24), and so there are closer to 2196 possible cryptographic keys in canonical form. Regardless, the numeric representation in this particular example requires 50 bytes to store or transmit.
[79] In some embodiments, the cryptographic key can be represented in human-readable string form. A string-based representation of a cryptographic key can be easier for humans to read than a numeric form, and can allow for encodings of keys that are invalid in space-efficient form. For example, if a user constructs a cryptographic key from a set of non-unique dice, such as one with two T dice and no U die, the numeric or binary form cannot be used to encode the result.
[80] In one example embodiment, the cryptographic key’s string-based representation is a 75- character UTF8 string, made up of 25 3-character triples, each of which represents one die. The triples are ordered in the order of the dice in canonical form (index 0 to 24). The first two characters of each triple are the two characters that appear on the dice, from left to right. The first character of the triple is the letter that appears on the die. The second character of the triple is the printed digit that appears on the die, from T to '6'. The third character of the triple is the orientation, as character Ό', 'G, 2', or '3', with each readable digit mapping to the numeric representation of orientation used in numeric form. In other words, O' is upright, T facing right (1 clockwise turn of 90 degrees), '2' is upside-down (2 turns), and '3' facing left (3 clockwise turns). In some embodiments, this representation can also be used for variants that employ other character pairs to represent each die face (including, e.g., those from other languages).
[81] Error checking and detecting
[82] In some embodiments, one or more error checks are performed by the system based on the captured image of the arrangement. In some embodiments, the lines above and below the characters in the images of the die face, i.e. the overline and underline, are configured to enable the system to detect and/or correct errors in identifying or recognizing the characters on the die faces.
[83] One example embodiment for detecting errors follows. The underline and overline rectangles encode 11 bits of data into rectangles of height 0.5mm, which are white to represent 1 (one) bits or black (i.e., absent) to represent 0 (zero) bits. The leftmost bit is always white (1) and the rightmost bit is always black (0). This ensures that, no matter what angle the line appears in, the system can identify the left side of the line as the side with a white rectangle closest to the edge. The second leftmost rectangle is black (0) for underlines and white (1) for overlines. The remaining 8 rectangles encode a byte, with the most significant of the eight bits on the left (the third rectangle location) and the least significant bit on the right (the tenth rectangle location).
[84] If an underline or overline cannot be read, there should be enough data on an overline to know which letter and digit appear on the die— so long as the overline was read correctly. Similarly, if the overline is missing but the underline is read and read correctly, the system can determine which letter and digit were read. This leads to the following requirements for byte encodings: (1) each face must have a unique underline byte, and (2) each face must have a unique overline byte. An algorithm reading the line will need to select a grayscale threshold below which a rectangle will be deemed black and at/above which it will be deemed white. The threshold can be calculated more reliably if the algorithm being used to calculate can assume there are least x black rectangles in a sample and y white rectangles in a sample. For
the 11 -positions where white rectangles may occur on a line, it is required that at least four should be black and at least four should be white. Since all underlines and overlines have one white rectangle for orientation, and overlines have a second white rectangle to indicate they are overlines, the following are requirements for the underline and overline bytes: (1) all underline bytes must have between 3-6 one bits (2-5 zero bits), and (2) all overline bytes must have between 2-5 one bits (3-6 zero bits). Thus, samples of dice rectangles can be assumed to fit a bimodal distribution (around grayscale values for black and white rectangles) with at least four points at each mode.
[85] Lastly, in this embodiment, one aim is to minimize the chance that errors will lead the underline byte and overline byte to return the same wrong answer (the same incorrect letter/digit pair). The system can be configured to maximize the number of bits that must be read in error for such an error to occur. To ensure at least four bits must be read in error to cause the underline and overline to agree on the same incorrect value, the following requirement is imposed: the 16-bit concatenation of the underline and overline bytes on each die face must be at least a hamming distance of four from that of every other die face.
[86] In this example embodiment, the underline and overline codes are generated based partly on techniques from Hamming(15, 11) codes, which encode 11 data bits with four parity bits. 8-bit messages are used (8 data bits), so the four parity bits of the hamming code are calculated with the last three data bits (d9-dl 1) set to zero. A fifth and final parity bit (pa) is the xor of all eight data bits and the four previous parity bits: pi = dl L d2 L d4 L d5 L d7 p2 = dl L d3 L d4 L d6 L d7 p4 = d2 L d3 L d4 L d8
p8 = d5 L d6 L d7 L d8 pa = dl L d2 L d3 L d4 L d5 L d6 L d7 L d8 L pi L p2 L p4 L p8;
[87] For an 8-bit candidate underline byte [dl, d2, d3, d4, d5, d6, d7, d8], the overline is generated as the 3 data bits, each negated, followed by the five parity bits. underlineByte = [dl, d2, d3, d4, d5, d6, d7, d8] overlineByte = [~dl, ~d2, ~d3, pi, p2, p4, p8, pa]
[88] The reason the three data bits are negated in the overline is to ensure that, if there are any system errors biasing all values to one or zero in underlines or overlines, that such errors will ensure the underline and overline codes do not decode to the same die face. Not all values represent valid underline bytes. Rather, underline bytes are enumerated starting from 0 (which is not valid) and only use those underline bytes that meet all the above requirements. The first valid underline byte represents Al, the second valid underline value represents A2, the seventh Bl, etc.
[89] Example uses
[90] Once a cryptographic key is generated, it can be put to many potential uses either directly or as a seed from which other keys are generated. FIG. 2B is a flow chart illustrating additional steps for providing a cryptographic key from dice, in accordance with some embodiments. Step 208 is described above with respect to FIG. 2A.
[91] At optional step 222, the system uses a secret derived from the cryptographic key to seed an authenticator device or application running an authentication-based or cryptographic protocol.
[92] FIGS. 4A, 4B, and 4C illustrate an example embodiment of using a secret derived from the cryptographic key to seed an authenticator device or application running an authentication-
based or cryptographic protocol. For example, a user can seed the keys they carry around with them, such that if the user loses or misplaces one, it can be replaced with a cryptographically identical replica. In FIG. 4A, a user operates a smartphone running an application labeled a “Companion App” for the dice grid. The application is configured to capture an image of the dice grid, identify the images on the die faces, generate a cryptographic key, derive a secret from the cryptographic key, and seed an authenticator device. In the figure, the user is in the process of opening or unlocking the dice grid. The application has a user interface button for reading the dice grid. The smartphone additionally has an authenticator device connected via a cable. The authenticator device in this example is a FIDO-based token, but it can be a device running FIDO, WebAuthN, or any related authentication-based or cryptographic protocol. In some embodiments, instead of seeding an authenticator device, an authentication application is seeded. In some embodiments, the secret is any machine-readable secret data which can be generated from the cryptographic key. For example, a sequence of words based on the cryptographic key may be a secret.
[93] In FIG. 4B, the user has opened the dice grid and taken a picture of the dice grid using the smartphone’s built-in camera. The dice grid application then automatically identified the images on the die faces and displayed them on the smartphone screen. The user is now presented with user interface options to write the FIDO token, view the public key, or forget the dice grid.
[94] In FIG. 4C, the user has chosen the option to write the FIDO token. The screen displays a prompt to press the button on the FIDO token. The user presses the button on the FIDO token, which generates a secret which is derived from the cryptographic key, then seeds the FIDO token with the secret.
[95] Returning to FIG. 2B, at optional step 224, the system alternatively or additionally generates a password derived from the cryptographic key. FIGS. 5A - 5F illustrate an example of using a cryptographic key to generate a password with a password manager.
[96] FIG. 5A illustrates an example of a user interface of a password manager. A user is asked to enter their email address, name, and a master password, then can click “submit” or “cancel” as needed. For the master password, rather than typing in a password manually, the user can click on “use your dice grid”. This link sends the user to a dice grid website or application, as shown in FIG. 5B. FIG. 5B illustrates a dice grid application and user interface. The screen reads, “May your password manager use your DiceKey [i.e., dice grid] to create a password? (Your password manager will not see your DiceKey)”. The user is then able to take a picture of the dice grid using the device’s built-in camera. FIG. 5C illustrates the user in the process of taking a picture of the dice grid with the built-in camera. FIG. 5D illustrates the system in the process of identifying the images on the die faces exposed on the dice grid, after capturing the image of the dice grid. FIG. 5E illustrates the dice grid application in a stage after it has completed the identification of the die faces, and has generated a cryptographic key. The user is given the option to send the password to the password manager. The user is also given the option to “open the dice grid” on the application itself. FIG. 5F illustrates the dice grid application when the user selects the option to open the dice grid. Upon clicking, the user is shown the dice grid with identified characters, overlines, and underlines as read in from the dice grid. In some embodiments, the user may be able to manually verify the information is correct, and modify the information if one or more aspects are inaccurate. FIG. 5G illustrates the user interface of the password manager after the master password has been generated based on the generated cryptographic key. In this case, a string of words has been generated as the
master password, and has been derived from the cryptographic key. When the master password may be needed again, the user can re-derive the master password from the dice grid in the same way as illustrated.
[97] Returning to FIG. 2B, at optional step 226, the system uses an application-specific cryptographic key, derived from the human- and machine-readable dice key, in an end-to-end encrypted application. In some embodiments, the application-specific cryptographic key is used as a primary authentication or encryption key for the end-to-end encrypted application. For example, the human- and machine-readable cryptographic key, as read from the dice grid, can derive a primary encryption key used directly to encrypt the application’s data. In some embodiments, the application creates its own primary authentication key, and encrypts that primary key with an application-specific cryptographic key derived from the human- and machine-readable key, allowing the primary key to be recovered by decrypting it with the human and-machine readable dice key in the future. For example, the human- and machine- readable cryptographic key represented by the dice grid can be used to derive a public-private key pair for purposes of authentication. In some embodiments, the process may be similar to or share elements with the process illustrated in FIGS. 5A - 5F and described above.
[98] At optional step 228, the system uses an Application Programming Interface (API) to enable a third-party application to request the system to derive cryptographic keys or secrets, and to provide them to the application, or to request the system to perform cryptographic operations with derived secrets and to return the results to the application. In some embodiments, this is performed without the system enabling access by the third-party application to the human- and machine-readable cryptographic key or any derived keys. In
some embodiments, the process may be similar to or share elements with the process illustrated in FIGS. 5 A - 5F and described above.
[99] FIG. 6 illustrates an example of error detection and correction, in accordance with the described embodiments. The example shows a user attempting to take a picture of the dice grid in order for the system to capture an image of the dice grid. Toward the top left of the dice grid, the underline for B6, which appears above the overline since the die is up-side down, is covered by the user’s thumb, but the camera appears to be able to see through the thumb to make out the outline of the underline. In this case, the algorithm has actually been able to read the overline (above the B6 on the logical die but below it in the frame), determine that it is in fact an overline (i.e., not an underline), then from that information and the dimensions and position of the overline, it extrapolates where the underline should be, and draws a red box there. It can then identify the “B6” based on reading the overline. Thus, even though there is user error of a thumb covering part of the image of a die face, the error detection of the system has used the underline and overline to detect the error and correct for it.
[100] FIG. 7 is a diagram illustrating an exemplary computer that may perform processing in some embodiments. Exemplary computer 700 may perform operations consistent with some embodiments. The architecture of computer 700 is exemplary. Computers can be implemented in a variety of other ways. A wide variety of computers can be used in accordance with the embodiments herein. In some embodiments, cloud computing components and/or processes may be substituted for any number of components or processes illustrated in the example.
[101] Processor 701 may perform computing functions such as running computer programs. The volatile memory 702 may provide temporary storage of data for the processor 701. RAM is
one kind of volatile memory. Volatile memory typically requires power to maintain its stored information. Storage 703 provides computer storage for data, instructions, and/or arbitrary information. Non-volatile memory, which can preserve data even when not powered and including disks and flash memory, is an example of storage. Storage 703 may be organized as a file system, database, or in other ways. Data, instructions, and information may be loaded from storage 703 into volatile memory 702 for processing by the processor 701.
[102] The computer 700 may include peripherals 705. Peripherals 705 may include input peripherals such as a keyboard, mouse, trackball, video camera, microphone, and other input devices. Peripherals 705 may also include output devices such as a display. Peripherals 705 may include removable media devices such as CD-R and DVD-R recorders / players. Communications device 706 may connect the computer 100 to an external medium. For example, communications device 706 may take the form of a network adapter that provides communications to a network. A computer 700 may also include a variety of other devices 704. The various components of the computer 700 may be connected by a connection medium 710 such as a bus, crossbar, or network.
[103] While the invention has been particularly shown and described with reference to specific embodiments thereof, it should be understood that changes in the form and details of the disclosed embodiments may be made without departing from the scope of the invention. Although various advantages, aspects, and objects of the present invention have been discussed herein with reference to various embodiments, it will be understood that the scope of the invention should not be limited by reference to such advantages, aspects, and objects. Rather, the scope of the invention should be determined with reference to patent claims.
Claims
1. A method for providing a cryptographic key from dice, the method comprising: placing a plurality of dice into an arrangement to fill a dice grid, wherein the plurality of dice each contain a plurality of faces, wherein each of the die faces of the plurality of dice comprises an image; capturing, via a client device, an image of the arrangement; processing the captured image of the arrangement to identify each image on the die faces exposed on the dice grid; and generating a cryptographic key from the captured image of the arrangement and the identified images, wherein the cryptographic key is a representation of the arrangement in a canonical sequence.
2. The method of claim 1, wherein the arrangement contains: a position of each die within the dice grid, an exposed face of each die with respect to the front of the dice grid, and an orientation of the exposed face of each die relative to a frame of reference.
3. The method of claim 1 or 2, wherein the arrangement is generated via a random process.
4. The method of any one of claims 1-3, further comprising: locking the arrangement of the dice grid such that the arrangement cannot be altered.
5. The method of any one of claims 1-4, wherein the cryptographic key comprises one or more of: a binary representation of the arrangement, and a string representation of the arrangement.
6. The method of any one of claims 1-5, wherein each image on the die faces comprises one or more letters, numbers, and/or symbols associated with a portion of the cryptographic key.
7. The method of any one of claims 1-6, wherein each image on the die faces comprises an overline and/or an underline representing a plurality of data bits associated with a portion of the cryptographic key.
8. The method of any one of claims 1-7, wherein the canonical sequence is based on a set of rules determining at least: a starting die within the dice grid, an upright position for each die based on the image exposed on the dice grid for that die, and a reading order from the starting die to an ending die within the dice grid.
9. The method of any one of claims 1-8, wherein the dice grid is in the form of one of: a square or a rectangle.
10. The method of any one of claims 1-9, wherein capturing the image of the arrangement comprises capturing, with the client device, an image of the dice grid in the arrangement.
11. The method of any one of claims 1-10, further comprising: sending, to the client device, a prompt for a user to manually identify or verify one or more visible images on the die faces exposed on the dice grid based on the captured image of the arrangement.
12. The method of any one of claims 1-11, further comprising: performing one or more error detection checks based on the captured image of the arrangement.
13. The method of any one of claims 1-12, further comprising: using a secret derived from the cryptographic key to seed an authenticator device or application running an authentication-based or cryptographic protocol.
14. The method of any one of claims 1-13, further comprising:
generating a password derived from the cryptographic key.
15. The method of any one of claims 1-14, further comprising: using an application-specific cryptographic key derived from the cryptographic key in an end-to-end encrypted application as a primary authentication or encryption key or to back up a primary authentication or encryption key.
16. The method of any one of claims 1-15, further comprising: using an application programming interface (API) to enable a third-party application to derive keys or other secrets from the cryptographic key or perform operations with a derived cryptographic key without enabling access to the cryptographic key or the derived cryptographic key.
17. The method of any one of claims 1-16, wherein the image on each of the die faces of the plurality of dice comprises: one or more text characters; and an encoding of data into a line below the text characters and a line above the text characters, such that the encoding in each individual line: replicates the data in the text, and contains information sufficient to determine the size and position of both the location of the text and the other line.
18. The method of claim 17, wherein the encoding of data comprises a plurality of 0 bits and a plurality of 1 bits, and wherein the method further comprises: generating an error correction code from the encoding of data, wherein the number of 0 bits and 1 bits in the encoding of data is constrained such that: all possible encodings have a minimum number of 0 bits and 1 bits, and a grayscale threshold is exceeded for one or more of the 0 bits and 1 bits in order to identify the lines as black or white.
19. The method of claim 17 or 18, wherein the encoding of data comprises a plurality of 0 bits and a plurality of 1 bits, and wherein the method further comprises: generating an error correction code from the encoding of data, wherein some of the pluralities of 0 bits and 1 bits are inverted copies of other bits so as to catch all errors in which the 0 bits and 1 bits in a region of the encoding of data are either falsely set as 1 to 0 or cleared as 0 to 1
20. The method of any one of claims 1-19, wherein the dice may have an arbitrary number of die faces.
21. The method of claim 20, wherein any single-faced dice are flat and comprise a side with a face and a side without a face, wherein any two-faced dice are flat and comprise two sides each having a face, and wherein any six-sided dice are represented as cubes with rounded corners.
22. A non-transitory computer-readable medium containing instructions for providing a cryptographic key from dice, comprising: instructions for placing a plurality of dice into an arrangement to fill a dice grid, wherein the plurality of dice each contain a plurality of faces, wherein each of the die faces of the plurality of dice comprises an image; instructions for capturing, via a client device, an image of the arrangement; instructions for processing the captured image of the arrangement to identify each image on the die faces exposed on the dice grid; and instructions for generating a cryptographic key from the captured image of the arrangement and the identified images, wherein the cryptographic key is a representation of the arrangement in a canonical sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20860754.9A EP4026271A4 (en) | 2019-09-04 | 2020-09-01 | Human- and machine-readable cryptographic keys from dice |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962895985P | 2019-09-04 | 2019-09-04 | |
US62/895,985 | 2019-09-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021046063A1 true WO2021046063A1 (en) | 2021-03-11 |
Family
ID=74680525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2020/048961 WO2021046063A1 (en) | 2019-09-04 | 2020-09-01 | Human- and machine-readable cryptographic keys from dice |
Country Status (3)
Country | Link |
---|---|
US (1) | US11438182B2 (en) |
EP (1) | EP4026271A4 (en) |
WO (1) | WO2021046063A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557852B1 (en) * | 2001-08-20 | 2003-05-06 | Michael Dyer Cuddy | Cubic sexenary (base 6) dice for generating radom numbers from a predetermined set |
CA2706673A1 (en) | 2010-06-14 | 2011-12-14 | Thierry Moreau | Device and system for practical entropy collection from dice |
US20150367230A1 (en) | 2013-02-01 | 2015-12-24 | Appycube Ltd. | Puzzle cube and communication system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5398285A (en) * | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
US7570781B2 (en) * | 1999-05-19 | 2009-08-04 | Digimarc Corporation | Embedded data in gaming objects for authentication and association of behavior information |
US8726148B1 (en) * | 1999-09-28 | 2014-05-13 | Cloanto Corporation | Method and apparatus for processing text and character data |
US7681046B1 (en) * | 2003-09-26 | 2010-03-16 | Andrew Morgan | System with secure cryptographic capabilities using a hardware specific digital secret |
US20090206548A1 (en) * | 2008-02-15 | 2009-08-20 | Scott Allan Hawkins | Protective game piece cover and faceplates |
US11182244B2 (en) * | 2018-10-16 | 2021-11-23 | Micron Technology, Inc. | Error correction management for a memory device |
US11069397B2 (en) * | 2019-04-01 | 2021-07-20 | Micron Technology, Inc. | Phase clock correction |
-
2020
- 2020-09-01 WO PCT/US2020/048961 patent/WO2021046063A1/en unknown
- 2020-09-01 EP EP20860754.9A patent/EP4026271A4/en active Pending
- 2020-09-01 US US17/009,665 patent/US11438182B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557852B1 (en) * | 2001-08-20 | 2003-05-06 | Michael Dyer Cuddy | Cubic sexenary (base 6) dice for generating radom numbers from a predetermined set |
CA2706673A1 (en) | 2010-06-14 | 2011-12-14 | Thierry Moreau | Device and system for practical entropy collection from dice |
US20150367230A1 (en) | 2013-02-01 | 2015-12-24 | Appycube Ltd. | Puzzle cube and communication system |
Non-Patent Citations (2)
Title |
---|
MICHAEL D LEONHARD ET AL., A COMPARATIVE STUDY OF THREE RANDOM PASSWORD GENERATORS, 1 May 2007 (2007-05-01) |
See also references of EP4026271A4 |
Also Published As
Publication number | Publication date |
---|---|
EP4026271A1 (en) | 2022-07-13 |
EP4026271A4 (en) | 2023-09-13 |
US11438182B2 (en) | 2022-09-06 |
US20210067354A1 (en) | 2021-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11743041B2 (en) | Technologies for private key recovery in distributed ledger systems | |
US11811936B2 (en) | Public/private key biometric authentication system | |
US10594688B2 (en) | Privacy-enhanced biometrics-secret binding scheme | |
US11409458B2 (en) | Migration of information via storage devices | |
Juels et al. | A fuzzy commitment scheme | |
US20160180075A1 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US11886618B1 (en) | Systems and processes for lossy biometric representations | |
CN110383758B (en) | Computer system, secret information verification method, and computer | |
TW200952439A (en) | Method and system for on-screen authentication using secret visual message | |
US11804959B2 (en) | System and method for securing personal information via biometric public key | |
US11693944B2 (en) | Visual image authentication | |
US11451540B2 (en) | Method of authentication | |
US11128453B2 (en) | Visual image authentication | |
Eminagaoglu et al. | A two-factor authentication system with QR codes for web and mobile applications | |
US20180285369A1 (en) | Manifest generation for data transfers | |
Falkner et al. | E-voting Authentication with QR-codes | |
JP2023515956A (en) | Secret splitting and metadata storage | |
EP2973162B1 (en) | Privacy preserving knowledge/factor possession tests for persistent authentication | |
JP2013257887A (en) | Information processing device, information processing method, and program | |
US11438182B2 (en) | Human- and machine-readable cryptographic keys from dice | |
Juels | Fuzzy commitment | |
US20240250935A1 (en) | Communication system, communication method, and program | |
US20240291653A1 (en) | Communication system, communication method, and program | |
JP7569418B1 (en) | User Authentication System | |
US20230144774A1 (en) | System for secure multi-protocol processing of cryptographic data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20860754 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020860754 Country of ref document: EP Effective date: 20220404 |