Security Applications of Combinatorial Puzzles (2006–2008)
We aim to develop new and efficient key management and key sharing schemes for safeguarding computer networks. Varying levels of security will be provided through the solution of puzzles whereby would-be clients provide evidence of legitimacy and gain access to the system by presenting correct solutions to puzzles. We plan to use both mathematical puzzles, based on selections and arrangements of objects from a finite set, and possibly physical puzzles such as IQ puzzles where a solution is achieved by tiling a grid with given shapes. The emphasis will be on visual cryptology and presenting schemes within a visual environment.