2014 International Carnahan Conference on Security Technology (ICCST) 2014
DOI: 10.1109/ccst.2014.6986985
|View full text |Cite
|
Sign up to set email alerts
|

A probabilistic framework for improved password strength metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(20 citation statements)
references
References 5 publications
0
20
0
Order By: Relevance
“…Since the first cracking methods using probabilities appeared to reduce the size of dictionaries in dictionary-based attacks [60], many different probabilistic strength estimation algorithms have been proposed. The vast majority of these techniques take advantage of the lessons learned in the field of natural language modeling [68] and may be grouped in three main trends: 1) Approaches that model passwords as simple character sequences using some form of the popular Markov Models [15], [17], [19], [47], [62]. 2) A very successful line of research using Probabilistic Context-Free Grammars (PCFG) was initiated by Weir as a cracking tool [48] that was further refined in [63].…”
Section: Probabilistic-based Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…Since the first cracking methods using probabilities appeared to reduce the size of dictionaries in dictionary-based attacks [60], many different probabilistic strength estimation algorithms have been proposed. The vast majority of these techniques take advantage of the lessons learned in the field of natural language modeling [68] and may be grouped in three main trends: 1) Approaches that model passwords as simple character sequences using some form of the popular Markov Models [15], [17], [19], [47], [62]. 2) A very successful line of research using Probabilistic Context-Free Grammars (PCFG) was initiated by Weir as a cracking tool [48] that was further refined in [63].…”
Section: Probabilistic-based Approachesmentioning
confidence: 99%
“…If the reader is not fully familiar with Markov Chains and other related concepts such as smoothing, it is highly recommended to go over some general work in the topic like [16], [49], [69] before moving to the description of the two novel methods. As an introduction to how Markov models can be applied to the representation of passwords, it is also important to get acquainted with the two simple models that were introduced in [19] and further analyzed in [62]: the discrete time Simple Markov Chain and the discrete time Layered Markov Chain. We believe that this initial introductory readings can help to better understand the more complex models developed in the work and presented in Sects.…”
Section: Strength Module 2: Non-trivial Passwordsmentioning
confidence: 99%
See 3 more Smart Citations