Proceedings of the 17th ACM Conference on Computer and Communications Security 2010
DOI: 10.1145/1866307.1866327
|View full text |Cite
|
Sign up to set email alerts
|

Testing metrics for password creation policies by attacking large sets of revealed passwords

Abstract: In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the security provided by various password creation policies. This is accomplished by modeling the success rate of current password cracking techniques against real user passwords. These data sets were collected from several different websites, the largest one containing over 32 million passwords. This focus on actual attack methodologies and real user passwords quite possibly makes this on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
244
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 285 publications
(252 citation statements)
references
References 11 publications
(16 reference statements)
3
244
1
Order By: Relevance
“…However, this is mathematically unsuited to measuring guessing difficulty 6 [14,9] and recently been confirmed experimentally to be a poor measure of cracking difficulty for human-chosen passwords [21]. A more sound measure is guesswork :…”
Section: Quantifying Resistance To Guessingmentioning
confidence: 99%
See 2 more Smart Citations
“…However, this is mathematically unsuited to measuring guessing difficulty 6 [14,9] and recently been confirmed experimentally to be a poor measure of cracking difficulty for human-chosen passwords [21]. A more sound measure is guesswork :…”
Section: Quantifying Resistance To Guessingmentioning
confidence: 99%
“…RockYou The leak of 32 million textual passwords from the social gaming website RockYou in 2009 has proved invaluable for password research [21]. We extracted all consecutive sequences of exactly 4 digits from the RockYou passwords.…”
Section: Human Choice Of Other 4-digit Sequencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Survey after survey finds that users ignore most security precautions, yet it seems implausible that two billion people would use the Internet if a majority suffered serious harm each year. The leak of 32 million RockYou user credentials [13] has not been linked to any visible surge in fraud (albeit, proving such direct links convincingly can be difficult). The reasons for this apparent lack of visible harm are poorly understood.…”
Section: Inability To Quantify Harmmentioning
confidence: 99%
“…Infotheoretic entropy and the NIST criteria are poor measures [13] when users choose common passwords, e.g., 'Pa$$w0rd' isn't particularly strong. Strength is better measured relevant to a large population of passwords, as popularity is a main determinant of risk.…”
Section: Understanding Strength Online Offlinementioning
confidence: 99%