The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs

Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design an algorithm that strengthens security of passwords. The core idea of our simple met...

متن کامل

epl draft The weak password problem : chaos , criticality , and encrypted p - CAPTCHAs

Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design an algorithm that strengthens security of passwords. The core idea of our method is ...

متن کامل

Password-based Encrypted Group Key Agreement

This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumption. In a password-based key agreement protocol, the users only share a human-memorable low entropy password; and using this low-entropy password, the users can agree upon a high-entropy session key which they may use ...

متن کامل

Simple Password-Based Encrypted Key Exchange Protocols

Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable channel with a secure session key even when the secret key or password shared between two users is drawn from a small set of values. In this paper, we present two simple password-based encrypted key exchange protocols based on that of Bellovin and Merritt. While one pr...

متن کامل

Preventing Weak Password Choices

A common problem with systems that use passwords for authentication results when users choose weak passwords. Weak passwords are passwords that arc easy to guess, or likely to be found in a dictionary attack. Thus, the choice of weak passwords may lead to system compromisation. Methods exist to prevent users from selecting and using weak passwords. One common method is to compare user choices a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EPL (Europhysics Letters)

سال: 2011

ISSN: 0295-5075,1286-4854

DOI: 10.1209/0295-5075/95/50007