--- marp: true theme: default paginate: true ---
Pictographic passcodes for resilient authentication at the edge
Arcanum Technologies + Auburn University’s McCrary Institute
--- # Defining the Problem - **Historical Context** - Passwords as cornerstone of "something you know" authentication since 1961 (MIT's Compatible Time-Sharing System) - No major reinvention in over 60 years, despite evolving threats - **Key Problems in Authentication** - High cognitive load: 12-16 character passwords rotated every 60-90 days; prone to reuse and errors under stress - Vulnerabilities: Hacked at 95 per second globally; susceptible to phishing, keyloggers, and credential harvesting - **Tactical Edge Challenges:** Difficult with tactical gear (e.g., gloves); bypassed in high-risk, low-bandwidth environments; limits multi-factor authentication (MFA) --- # Current State-of-the-Art - **Relies on static inputs:** Keyboards, text-based passwords - **Biometrics (facial/iris/fingerprint/voice):** Effective in ideal conditions but constrained in low-light, noisy, or gloved scenarios - **Current Tech:** Zero Trust, edge computing, AI-driven security in systems like Tactical Assault Kits, but compromised by AI attacks, signals intelligence, and nation-state exploits --- # nKode Advances the State-of-the-Art - **What’s New in nKode’s Approach** - Patented virtual keypad with shuffling icons; AI-generated, user-unique icon sets - **Vs. Passwords:** No text entry; strong guessing resistance with compact inputs - Zero-trust architectures leveraging ChaCha20 to drive shuffling and OPAQUE (aPAKE) for mutual authentication over low-trust links - Resilient to keyloggers and replay; auto-rotation without user action; shoulder-surf resistant - **Why It Matters at the Edge** - Works in low-bandwidth or contested environments - Cuts cognitive load and speeds access, reducing bypass behavior - Preserves mission continuity for edge tools and C2 workflows --- # How nKode Aligns with DARPA ERIS - **Topic area fit:** Advances resilience, efficiency, and effectiveness for strategic systems across critical infrastructure and military C2 at strategic, command, operational, and tactical edges. - **Mission tie:** Supports DARPA’s aim to create technological surprise for U.S. national security. - **nKode’s role:** Reinvents “something you know” with keyboard-less, AI-generated icons to keep auth working in contested or low-bandwidth networks. - **Surprise element:** Resilient to credential reuse and keyloggers; can operate over unencrypted or bandwidth-constrained links without exposing secrets. - **Operational benefits:** Faster, low-cognitive-load access under stress; reduces bypasses and maintains mission continuity for edge tools like TAK. - **Architectural alignment:** Zero Trust, edge computing, and secure operations in dynamic, degraded conditions. - **Impact:** Hardens C2 and critical infrastructure against AI-driven credential harvesting and disruption in contested environments. --- # Why nKode Will Succeed - **Pitch History:** Winner of the FIS VC and Venturetech Pitch competitions - **Technical:** Integration with legacy DoD systems; user training; device compatibility (rugged tablets) - **Evolving Threats:** Advanced AI shoulder-surfing; scaling to millions/billions of unique, psychologically neutral icons to prevent AI prediction of user selections - **Mitigation:** Leverage ERIS for rapid pathways; partner with McCrary Institute for validation - **Market Validation:** Independent survey by User Insight – 62% prefer nKode (vs. 23% passwords) - **Team Strength:** Veterans with cyber ops experience; TRL 4 - **Dual-Use Potential:** Defense (tactical edge) + Commercial - **Evidence:** Exceeds benchmarks; low friction deployment --- # Proposed Plan/Strategy if Funded - **Target:** TRL 4 → TRL 6 (operationally relevant prototype) - **De-risking milestone 1 — independent validation:** Obtain an **independent, implementation-agnostic** review of the system’s **zero-trust architecture**, including threat model, assumptions, and security claims. - **De-risking milestone 2 — implementation testing:** Conduct **penetration testing / red-teaming** of the prototype to uncover practical vulnerabilities and harden the deployed system under tactical-edge constraints (low bandwidth, intermittent connectivity). - **De-risking milestone 3 — scale enabler:** Deliver a repeatable pipeline capable of producing **millions to billions** of **psychologically neutral** icons to support scale without introducing bias. - **Result:** A validated design and hardened, scalable prototype ready for operationally relevant evaluation. --- # Arcanum and McCrary Technical Team