Answer Option Impact
Explore tables showing how success odds shrink as answer counts increase.
Open Answer Options PageSection 5
The IWISI challenge engine uses a mathematical design to maximize entropy while minimizing unauthorized success through a cognitive air-gap model.
Moving from single-choice to multi-select changes the attack model from selecting one answer to selecting a subset of answers. For n presented choices, the attacker now faces 2^ncombinations.
With 5 primary choices, random pass probability changes from 1/5 (20%) to 1/32 (3.125%).
None of the Above (NOTA) is a conditional operator: it is correct only when the intersection between displayed options and true identity anchors is empty. This forces independent evaluation of all options and blocks process-of-elimination shortcuts.
With a variable number of correct answers c (for example, 0 through 3), users cannot stop after recognizing one familiar item. This reduces satisficing behavior and keeps decoys mathematically relevant in each prompt.
When a generator emits zero valid anchors for a prompt, the actor must correctly avoid selecting decoys and choose NOTA. This state is especially effective against brute-force scripts that assume at least one visible match exists.
Cumulative success is the product of per-question success probabilities.
That is about 1 in 1.07 billion. Each additional question contributes a new log-scale protection layer.
The 4-digit PIN introduces a second independent challenge type (recall vs. recognition).
Combining two different cognitive channels sharply reduces non-targeted attack viability.
IWISI scoring is deterministic: any mismatch from the true answer set is logged as failure. This removes partial-credit effects and suppresses false positives in the authentication stream.
Decoys are generated to minimize visual distance from valid answers. Low visual distance prevents attackers from spotting outliers with superficial pattern matching and preserves intended entropy.
Logged duration values (for example, duration_micros) can demonstrate that validation time remains stable while entropy increases. This supports the claim of strong security with low user-facing latency.
Very low unauthorized pass probability supports treating a successful pass as high-confidence proof of identity. This enables frictionless stepping in a zero-trust architecture based on continuous proof, not assumed trust.
Explore tables showing how success odds shrink as answer counts increase.
Open Answer Options PageCompare strict versus threshold pass rates as quiz length changes.
Open Question Count Page