Systems and methods for password protection are described. In one aspect,
an asymmetric key pair is deterministically formed by combining a
password and other data. The public key of the asymmetric key pair is
exported to an external device. The private key of the asymmetric key
pair is used to effect subsequent authentications to the external device.