‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security

نویسنده

  • Daniel V. Klein
چکیده

With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system ‘‘crackers,’’ data theft, data corruption very real. This paper outlines some of the problems of current password security by demonstrating the ease by which individual accounts may be broken. Various techniques used by crackers are outlined, and finally one solution to this point of system vulnerability, a proactive password checker, is proposed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to , Password Securit

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements to ,

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA Survey of , and Improvements

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

‘ ‘ Foiling the Cracker ’ ’ : yA

c Unix. When Unix was younger, the password encryption algorithm was a simulation of the M-209 ipher machine used by the U.S. Army during World War II [Morris1979]. This was a fair encryption s t mechanism in that it was difficult to invert under the proper circumstances, but suffered in that it wa oo fast an algorithm. On a PDP-11/70, each encryption took approximately 1.25ms, so that it was p...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007