2012
DOI: 10.1007/978-3-642-34210-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Cracking Associative Passwords

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…The use of single words, either alone or together with digits, is a bad habit. However, use of several modified words or use of sentences adds robustness against password cracking (Helkala et al, 2012). Due to the small number of users without guidance in this case, we can conclude only with 90 per cent confidence interval that the users without guidance more often use pure words (38 Ϯ 11 per cent of the respondents without guidance and 21 Ϯ 6 per cent with guidance).…”
Section: Description Of a Good Passwordmentioning
confidence: 74%
“…The use of single words, either alone or together with digits, is a bad habit. However, use of several modified words or use of sentences adds robustness against password cracking (Helkala et al, 2012). Due to the small number of users without guidance in this case, we can conclude only with 90 per cent confidence interval that the users without guidance more often use pure words (38 Ϯ 11 per cent of the respondents without guidance and 21 Ϯ 6 per cent with guidance).…”
Section: Description Of a Good Passwordmentioning
confidence: 74%
“…e researches present about some possibilities which can be done to break the password in both ways: offline and online. Moreover, Helkala et al [13] reinforced Venter's research by using small instruments that yielded high impacts. In addition, Pilli et al [14] and Vykopal [15] described other aspects of BFAs regarding taxonomy, multiple approaches, and distributions.…”
Section: Related Workmentioning
confidence: 99%
“…Both of these attacks are illustrated in Figure 1. Meanwhile, online password hacking has been described in [18], and offline hacking research has demonstrated that a number of characters and password combinations greatly influence the length of time required for hacking [13,15]. Overall, all cited investigators stressed that BFAs have real-time capability to actually deduce valid passwords on FTP servers.…”
Section: Related Workmentioning
confidence: 99%