Password Cracking and Countermeasures in Computer Security: A Survey
نویسندگان
چکیده
With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area. KeywordsComputer security; User authentication; Password cracking; Cryptanalysis; Countermeasures
منابع مشابه
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Very recently, Byun and Lee suggested two provably secure group Diffie-Hellman key exchange protocols using n participant’s distinct passwords. Unfortunately, the schemes were found to be flawed by Tang and Chen. They presented two password guessing attacks such as off-line and undetectable on-line dictionary attacks by malicious insider attacker. In this paper, we present concrete countermeasu...
متن کاملText Entry Method Affects Password Security
Text-based passwords continue to be the prime form of authentication to computer systems. Today, they are increasingly created and used with mobile text entry methods, such as touchscreens and mobile keyboards, in addition to traditional physical keyboards. This raises a foundational question for usable security: whether text entry methods affect password generation and password security. This ...
متن کاملComments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
In [3], Tang presented two password guessing attacks such as off-line and undetectable on-line dictionary attacks against password-based group Diffie-Hellman key exchange protocols by Byun and Lee [2]. In this paper, we present countermeasures for two attacks by Tang.
متن کاملPrevention Mechanism of Information Deceit
Data security and extracting intelligence from data in the form of information is the area where every organization is concerned about it. Network security is concerned with who connects to and what goes across a network. Net users have to provide personal credentials like passwords or wireless keys, and the network must protect with firewalls and intrusion detection system. Information securit...
متن کاملSecurity and Usability Analysis of Password Agent
Password plays an important role in online authentication. But it suffer from two interactable problems ,one is password cracking and second is password theft. Password agent mechanism contains strong hashing scheme which provides stronger protection against password theft and password cracking. Password Agent generates strong passwords by enhancing the hash function with a large random salt. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1411.7803 شماره
صفحات -
تاریخ انتشار 2014