Password cracking

Known as: Password cracker, Password Guessing, Passcracker 
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
We propose a simple method for improving the security of hashed passwords: the maintenance of additional ``honeywords'' (false… (More)
  • table 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
To help users create stronger text-based passwords, many web sites have deployed password meters that provide visual feedback on… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
In this research the following question is answered: what should KPMG advice their clients regarding to password length and… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper we attempt to determine the effectiveness of using entropy, as defined in NIST SP800-63, as a measurement of the… (More)
  • figure 3.1
  • figure 4.1
  • table 4.2
  • table 4.2
  • figure 4.4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Choosing the most effective word-mangling rules to use when performing a dictionary-based password cracking attack can be a… (More)
  • table 3.2
  • figure 3.3
  • table 3.3
  • table 3.3
  • figure 4.3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this paper we propose and evaluate new graphical password schemes that exploit features of graphical input displays to achieve… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Many authentication schemes depend on secret passwords. Unfortunately, the length and randomness of user-chosen passwords remain… (More)
  • figure I
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Passwords in the UNIX operating system are encrypted with the crypt algorithm and kept in the publicly-readable le /etc/passwd… (More)
  • figure 1
Is this relevant?