1. The complexity of human computation via a concrete model with an application to passwords
- Author
-
Manuel Blum and Santosh Vempala
- Subjects
Pseudorandom number generator ,Password ,050101 languages & linguistics ,Multidisciplinary ,Theoretical computer science ,Computer science ,Computability ,05 social sciences ,Models, Theoretical ,Cryptographic protocol ,USable ,Memorization ,Cognition ,Computability theory ,Schema (psychology) ,Physical Sciences ,Humans ,0501 psychology and cognitive sciences ,Algorithms ,Software ,050107 human factors - Abstract
What can humans compute in their heads? We are thinking of a variety of cryptographic protocols, games like sudoku, crossword puzzles, speed chess, and so on. For example, can a person compute a function in his or her head so that an eavesdropper with a powerful computer—who sees the responses to random inputs—still cannot infer responses to new inputs? To address such questions, we propose a rigorous model of human computation and associated measures of complexity. We apply the model and measures first and foremost to the problem of 1) humanly computable password generation and then, consider related problems of 2) humanly computable “one-way functions” and 3) humanly computable “pseudorandom generators.” The theory of human computability developed here plays by different rules than standard computability; the polynomial vs. exponential time divide of modern computability theory is irrelevant to human computation. In human computability, the step counts for both humans and computers must be more concrete. As an application and running example, password generation schemas are humanly computable algorithms based on private keys. Humanly computable and/or humanly usable mean, roughly speaking, that any human needing—and capable of using—passwords can if sufficiently motivated generate and memorize a secret key in less than 1 h (including all rehearsals) and can subsequently use schema plus key to transform website names (challenges) into passwords (responses) in less than 1 min. Moreover, the schemas have precisely defined measures of security against all adversaries, human and/or machine.
- Published
- 2020
- Full Text
- View/download PDF