Javascript must be enabled to continue!
Efficient Plain Password Cryptanalysis Techniques
View through CrossRef
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis for these password creation policies to make sure that passwords that are created based on these rules are resistance against real attacks. The current research work describes different password creation policies and password checkers that try to help users create strong passwords and addresses their issues. Metrics for password strength are explored in this research and efficient approaches to calculate these metrics for password distributions are introduced. Furthermore, efficient technique to estimate password strength based on its likelihood of being cracked by an attacker is described. In addition, a tool called PAM has been developed and explained in details in this paper to help users have strong passwords using these metrics; PAM is a password analyzer and modifier.
University of Baghdad College of Science
Title: Efficient Plain Password Cryptanalysis Techniques
Description:
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys).
Passwords are still one of the most common means of securing computer systems.
Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords.
They usually ignore the importance of usability of the password for the users.
The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis for these password creation policies to make sure that passwords that are created based on these rules are resistance against real attacks.
The current research work describes different password creation policies and password checkers that try to help users create strong passwords and addresses their issues.
Metrics for password strength are explored in this research and efficient approaches to calculate these metrics for password distributions are introduced.
Furthermore, efficient technique to estimate password strength based on its likelihood of being cracked by an attacker is described.
In addition, a tool called PAM has been developed and explained in details in this paper to help users have strong passwords using these metrics; PAM is a password analyzer and modifier.
Related Results
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Organizational Password Policy
Organizational Password Policy
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycle...
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work
Security is the prime concern in our day to day life while performing any activity. In the current scenario, accidental death of lineman is often read and evidenced. In this direct...
User password repetitive patterns analysis and visualization
User password repetitive patterns analysis and visualization
Purpose– Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical t...
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. A...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Machine Learning Based Password Strength Analysis
Machine Learning Based Password Strength Analysis
Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passw...

