Examination of a New Defense Mechanism: Honeywords

@inproceedings{Gen2013ExaminationOA,
  title={Examination of a New Defense Mechanism: Honeywords},
  author={Ziya Alper Genç and S{\"u}leyman Kardas and Mehmet Sabir Kiraz},
  booktitle={IACR Cryptology ePrint Archive},
  year={2013}
}
It has become much easier to crack a password hash with the advancements in the graphicalprocessing unit (GPU) technology. An adversary can recover a user’s password using brute-force attack on password hash. Once the password has been recovered no server can detect any illegitimate user authentication (if there is no extra mechanism used). In this context, recently, Juels and Rivest published a paper for improving the security of hashed passwords. Roughly speaking, they propose an approach for… CONTINUE READING
4 Citations
12 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-4 of 4 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Honeywords : Making password - cracking detectable

  • S. Komanduri, M. L. Mazurek, +5 authors J. Lopez
  • Netw . Secur .
  • 2009

Inside the password-stealing bus iness: the who and how of identity

  • D. Elser, M. Pekrul
  • 2009
1 Excerpt

Malware attacks: Anatomy of a malware attack

  • J. Erasmus
  • Netw. Secur. , 2009(1):4–7, Jan.
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…