‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security
نویسنده
چکیده
With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system ‘‘crackers,’’ data theft, data corruption very real. This paper outlines some of the problems of current password security by demonstrating the ease by which individual accounts may be broken. Various techniques used by crackers are outlined, and finally one solution to this point of system vulnerability, a proactive password checker, is proposed.
منابع مشابه
‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to , Password Securit
c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...
متن کامل‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to ,
c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...
متن کامل‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements
c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...
متن کامل‘ ‘ Foiling the Cracker ’ ’ : yA
c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007