A simple scheme to make passwords based on one-way functions much harder to crack

نویسنده

  • Udi Manber
چکیده

We present a simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder. The scheme is easy to program and easy to incrementally add to existing schemes. In particular, there is no need to switch to it all at the same time. Old passwords will still work and have the same security as before (one will not be able to distinguish them from new passwords); newly-entered passwords will become much more secure. The new scheme is independent of the one-way function used and does not require changing any part of the encryption mechanism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Brute Force Attack on UNIX Passwords with SIMD Computer

As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to “crack” a large fraction of pas...

متن کامل

استفاده از دستگاه مختصات متعامد محلی در مدل کردن ترک دو بعدی به روش المان محدود توسعه یافته

The extended finite element method (X-FEM) is a numerical method for modeling discontinuties, such as cracks, within the standard finite element framework. In X-FEM, special functions are added to the finite element approximation. For crack modeling in linear elasticity, appropriate functions are used for modeling discontinuties along the crack length and simulating the singularity in the crack...

متن کامل

A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Fracture mechanics-based life prediction of a riveted lap joint

In this paper, three-dimensional modeling of the fatigue crack growth profiles was performed in a simple riveted lap joint. Simulation results showed that mode I was dominated on the one side of the plates and the crack straightly grew on this side, while the other side of the plates was in a mixed-mode condition and the crack propagation path was not straight on this side. Afterward, the fract...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 15  شماره 

صفحات  -

تاریخ انتشار 1996