1995
DOI: 10.1016/0167-4048(95)00003-q
|View full text |Cite
|
Sign up to set email alerts
|

Improving system security via proactive password checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
80
0

Year Published

2000
2000
2016
2016

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 120 publications
(82 citation statements)
references
References 3 publications
1
80
0
Order By: Relevance
“…Weak passwords is also a widely known problem. The strength of user-chosen passwords against password guessing attacks has been studied since the early times of password-based authentication [8], [56], [40] Current techniques for password guessing are Markov models [44], [21], [37] and probabilistic context-free grammars [55]; stateof-the-art tools include John the Ripper [51] and HashCat [52]. Historically, the strength of passwords against guessing attacks has been assessed by using password crackers to find weak passwords [42].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Weak passwords is also a widely known problem. The strength of user-chosen passwords against password guessing attacks has been studied since the early times of password-based authentication [8], [56], [40] Current techniques for password guessing are Markov models [44], [21], [37] and probabilistic context-free grammars [55]; stateof-the-art tools include John the Ripper [51] and HashCat [52]. Historically, the strength of passwords against guessing attacks has been assessed by using password crackers to find weak passwords [42].…”
Section: Related Workmentioning
confidence: 99%
“…(8), replacing N by the number of logins N h k seen from the ISP (or country) h k , and M by the number M h k of unseen IPs from ISP (or country) h k . The ML estimate of p(h k ) is kept unsmoothed, and it is thus zero for unseen ISPs (or countries).…”
Section: Smoothingmentioning
confidence: 99%
See 1 more Smart Citation
“…), it does not provide much security, because users typically fail to select crack-resistant passwords. Many users do not know what are good choices for passwords, and those who do know what choices are safe will often select easy-to-remember passwords, such as variations of their own names or meaningful words, because much less effort is required than to generate safe passwords (Bishop & Klein, 1995). Moreover, a user is likely to have more than one account for which a usernamepassword combination is required; having to remember several "nonmeaningful" but crack-resistant passwords will likely require much more effort on the user's part than simply remembering a single safe password.…”
mentioning
confidence: 99%
“…Pro-active password checking [Bishop and Klein 1995] can help only to a limited degree: On the one hand, the choice of passwords has to be easy and unrestricted enough to make it possible for users to remember their passwords (without having to write them down). This limits the possible entropy in such passwords.…”
Section: Passwordmentioning
confidence: 99%