首页> 外文会议>3rd international conference on security of information and networks 2010 >The Weak and the Strong Password Preferences: A Case Study on Turkish Users
【24h】

The Weak and the Strong Password Preferences: A Case Study on Turkish Users

机译:弱密码设置和强密码设置:以土耳其用户为例

获取原文
获取原文并翻译 | 示例

摘要

Considering the computer authentication, any password shall not only be private to its owner but also be chosen as not to be predicted easily by others. The passwords used in authentication processes of any critical system should be strong as not to be cracked easily. In this context, the strong password choice gets significance for the general system security. This study aims to reveal the proper and improper properties on password preferences via examining the real samples. The method used in this work is first to gather the real passwords in plaintext, then to crack the encrypted forms of them and finally to investigate statistical queries on those passwords in order to distinguish the common weak and strong characteristics. As the case study, the experiments are conducted on real passwords of Turkish users in an actively running system. The results of the experiments are categorized for weak and strong passwords. Moreover, the common tendencies on password choice are evaluated.
机译:考虑到计算机的身份验证,任何密码不仅应由其所有者专有,而且应选择为不容易被他人预测的密码。任何关键系统的身份验证过程中使用的密码都应强健,以免轻易破解。在这种情况下,强大的密码选择对于一般系统安全性具有重要意义。这项研究旨在通过检查真实样本来揭示密码首选项的适当和不适当的属性。这项工作中使用的方法是,首先以明文形式收集真实的密码,然后破解它们的加密形式,最后调查这些密码的统计查询,以区分常见的弱和强特征。作为案例研究,在活跃运行的系统中对土耳其用户的真实密码进行了实验。实验的结果分为弱密码和强密码。此外,还评估了密码选择的常见趋势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号