Simple quantum password checking
نویسندگان
چکیده
منابع مشابه
Proactive Password Checking
This paper presents generic requirements for proactive password changer. It then examines two of the most popular, publicly-available programs to see how well they meet the requirements. Future directions are examined, as well as alternatives to such checkers.
متن کاملPSV (Password Security Visualizer): From Password Checking to User Education
This paper presents the Password Security Visualizer (PSV), an interactive visualization system specifically designed for password security education. PSV can be seen as a reconfigurable “box” containing different proactive password checkers (PPCs) and visualizers of password security information, allowing it to be used like a “many in one” or “hybrid” PPC. PSV can provide many new features tha...
متن کاملImproving system security via proactive password checking
As the Internet has grown, its user community has changed from a small tight knit group of researchers to a loose gathering of people on a global network. The amazing and constantly growing numbers of machines and users ensures that untrustworthy individuals have full access to that network. High speed inter-machine communication and even higher speed computational processors have made the thre...
متن کاملPretty-Simple Password-Authenticated Key-Exchange Protocol
In this paper, we propose pretty simple password-authenticated key-exchange protocol which is based on the difficulty of solving DDH problem. It has the following advantages: (1) Both y1 and y2 in our protocol are independent and thus they can be pre-computed and can be sent independently. This speeds up the protocol. (2) Clients and servers can use almost the same algorithm. This reduces the i...
متن کاملSimple Password-Based Encrypted Key Exchange Protocols
Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable channel with a secure session key even when the secret key or password shared between two users is drawn from a small set of values. In this paper, we present two simple password-based encrypted key exchange protocols based on that of Bellovin and Merritt. While one pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2015
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.91.062310