2004
DOI: 10.6028/nist.sp.800-63v1.0.1
|View full text |Cite
|
Sign up to set email alerts
|

Electronic authentication guideline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(55 citation statements)
references
References 0 publications
0
51
1
Order By: Relevance
“…This is also echoed by Loge et al's work on a PPC for Android unlock patterns [14], in which they observed that the password strength could be influenced by individual features such as age and gender. (2) to highlight the complexity of password security by externalizing inconsistencies between different PPCs and more advanced attacks on passwords; (3) to engage users actively so that the process of learning is enjoyable, (4) to produce an open system that can be easily executed and customized by users on different platforms. To achieve those design goals, we decided to follow some well-established design principles to design and implement PSV.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is also echoed by Loge et al's work on a PPC for Android unlock patterns [14], in which they observed that the password strength could be influenced by individual features such as age and gender. (2) to highlight the complexity of password security by externalizing inconsistencies between different PPCs and more advanced attacks on passwords; (3) to engage users actively so that the process of learning is enjoyable, (4) to produce an open system that can be easily executed and customized by users on different platforms. To achieve those design goals, we decided to follow some well-established design principles to design and implement PSV.…”
Section: Related Workmentioning
confidence: 99%
“…The second type covers PPCs. The current version incorporates four PPCs based on the common 1-D bar design: a PPC we developed based on the NIST password entropy [2] as the underlying PSM, the open-source password checker zxcvbn (which has been deployed by Dropbox) [33] 5 , the PPCs used by Microsoft and Yahoo! (for which we implemented our own versions).…”
Section: -D Canvas and Overall Look A 2-d Canvas Is Used As The Conmentioning
confidence: 99%
“…Note though, that we have to abort the game after the i-th setup session even if no ciphertext got replaced, as B does not know the secret keys of the honest servers, and thus could not correctly simulate a retrieval for that account. GAME 9 We now change the way the challenger performs the threshold encryption and decryption steps whenever dealing with an account that was created by an honest user with at most t corrupt servers. At setup, the challenger (as honest user) replaces the threshold encryptions C p and C K of p and K , respectively, by encryptions of 1, i.e C p = TEnc tpk (1), C K = TEnc tpk (1).…”
Section: F1 Sequence Of Gamesmentioning
confidence: 99%
“…Storing passwords in hashed form offers hardly any protection due to the efficiency of brute-force offline attacks using dictionaries. According to NIST [9], sixteen-character human-memorizable passwords only have 30 bits of entropy on average. With current graphical processors testing more than three hundred billion passwords per second [33], security must be considered lost as soon as an offline attack against the password data can be performed.…”
Section: Introductionmentioning
confidence: 99%
“…An attacker can identify the correct password pw in a reasonable time by running the program because the password space |D| is usually less than 2 30 as stated in [10].…”
Section: Off-line Dictionary Attacksmentioning
confidence: 99%