Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - A note on proactive password checking
AU - Yan, Jeff
PY - 2001
Y1 - 2001
N2 - Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactiv¢ password checking.
AB - Nowadays, proactive password checking algorithms are based on the philosophy of the dictionary attack, and they often fail to prevent some weak passwords with low entropy. In this paper, a new approach is proposed to deal with this new class of weak passwords by (roughly) measuring entropy. A simple example is given to exploit effective patterns to prevent low-entropy passwords as the first step of entropy-based proactiv¢ password checking.
KW - 13
KW - Proactive password checking~ dictionary attack
KW - dictionary attack
KW - done in a
KW - entropy
KW - in 1999
KW - kerbems setting where a
KW - proactive password checker was
KW - proactive password checking
KW - reported a password experiment
KW - wu
U2 - 10.1145/508171.508194
DO - 10.1145/508171.508194
M3 - Conference contribution/Paper
SN - 1581134576
T3 - Proceedings of the 2001 New Security Paradigms Workshop
SP - 127
EP - 135
BT - New Security Paradigms Workshop
PB - ACM
CY - New York
ER -