A simple scheme to make passwords based on one-way functions much harder to crack
نویسنده
چکیده
We present a simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder. The scheme is easy to program and easy to incrementally add to existing schemes. In particular, there is no need to switch to it all at the same time. Old passwords will still work and have the same security as before (one will not be able to distinguish them from new passwords); newly-entered passwords will become much more secure. The new scheme is independent of the one-way function used and does not require changing any part of the encryption mechanism.
منابع مشابه
Brute Force Attack on UNIX Passwords with SIMD Computer
As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in light of new technological advances. In this paper we evaluate the security of the UNIX password scheme. We show that the UNIX password scheme is vulnerable to brute-force attack. Using PixelFlow, a SIMD parallel machine, we are able to “crack” a large fraction of pas...
متن کاملاستفاده از دستگاه مختصات متعامد محلی در مدل کردن ترک دو بعدی به روش المان محدود توسعه یافته
The extended finite element method (X-FEM) is a numerical method for modeling discontinuties, such as cracks, within the standard finite element framework. In X-FEM, special functions are added to the finite element approximation. For crack modeling in linear elasticity, appropriate functions are used for modeling discontinuties along the crack length and simulating the singularity in the crack...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملFracture mechanics-based life prediction of a riveted lap joint
In this paper, three-dimensional modeling of the fatigue crack growth profiles was performed in a simple riveted lap joint. Simulation results showed that mode I was dominated on the one side of the plates and the crack straightly grew on this side, while the other side of the plates was in a mixed-mode condition and the crack propagation path was not straight on this side. Afterward, the fract...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 15 شماره
صفحات -
تاریخ انتشار 1996