10630

A state-of-the-art password strength analysis demonstrator

Nico van Heijningen
CMI-Program Technical Informatics – Rotterdam University
Rotterdam University, 2013
@article{van2013state,

   title={A state-of-the-art password strength analysis demonstrator},

   author={van Heijningen, Nico},

   year={2013}

}

Download Download (PDF)   View View   Source Source   

682

views

Due to recent developments: leaks of large lists of user passwords (e.g. LinkedIn), new probabilistic password cracking techniques and the introduction of password cracking using GPUs. Passwords can now be cracked faster than ever before. The leaked password lists have been analyzed by hackers and common patterns found inside the passwords are being exploited to crack others. We have analyzed a collection of these leaked password lists and generated a list of the most common patterns in a probabilistic order furthermore, we compared the distribution of characters inside passwords to that of English text. Next we have built a state-of-the-art password strength analysis demonstrator that is able to show which of these common patterns are contained inside a password and why it could be considered a "weak" password. The demonstrator is modeled after the realistic scenario of an automated password cracking attack and passwords that assessed "strong" should therefore "survive" such an attack. We are convinced our demonstrator is an improvement over the current password strength measurements because it results in a lesser "false sense of security" amongst its users and helps them make their passwords more resistant against such attacks.
VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

* * *

* * *

TwitterAPIExchange Object
(
    [oauth_access_token:TwitterAPIExchange:private] => 301967669-yDz6MrfyJFFsH1DVvrw5Xb9phx2d0DSOFuLehBGh
    [oauth_access_token_secret:TwitterAPIExchange:private] => o29ji3VLVmB6jASMqY8G7QZDCrdFmoTvCDNNUlb7s
    [consumer_key:TwitterAPIExchange:private] => TdQb63pho0ak9VevwMWpEgXAE
    [consumer_secret:TwitterAPIExchange:private] => Uq4rWz7nUnH1y6ab6uQ9xMk0KLcDrmckneEMdlq6G5E0jlQCFx
    [postfields:TwitterAPIExchange:private] => 
    [getfield:TwitterAPIExchange:private] => ?cursor=-1&screen_name=hgpu&skip_status=true&include_user_entities=false
    [oauth:protected] => Array
        (
            [oauth_consumer_key] => TdQb63pho0ak9VevwMWpEgXAE
            [oauth_nonce] => 1472367212
            [oauth_signature_method] => HMAC-SHA1
            [oauth_token] => 301967669-yDz6MrfyJFFsH1DVvrw5Xb9phx2d0DSOFuLehBGh
            [oauth_timestamp] => 1472367212
            [oauth_version] => 1.0
            [cursor] => -1
            [screen_name] => hgpu
            [skip_status] => true
            [include_user_entities] => false
            [oauth_signature] => VKJuhZqSpljywhHaYWCaLgTOJ40=
        )

    [url] => https://api.twitter.com/1.1/users/show.json
)
Follow us on Facebook
Follow us on Twitter

HGPU group

1969 peoples are following HGPU @twitter

HGPU group © 2010-2016 hgpu.org

All rights belong to the respective authors

Contact us: