scholarly journals Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking

2021 ◽  
pp. 334-353
Author(s):  
Wenjie Bai ◽  
Jeremiah Blocki ◽  
Ben Harsha
Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3106 ◽  
Author(s):  
Sungyup Nam ◽  
Seungho Jeon ◽  
Hongkyo Kim ◽  
Jongsub Moon

Text-based passwords are a fundamental and popular means of authentication. Password authentication can be simply implemented because it does not require any equipment, unlike biometric authentication, and it relies only on the users’ memory. This reliance on memory is a weakness of passwords, and people therefore usually use easy-to-remember passwords, such as “iloveyou1234”. However, these sample passwords are not difficult to crack. The default passwords of IoT also are text-based passwords and are easy to crack. This weakness enables free password cracking tools such as Hashcat and JtR to execute millions of cracking attempts per second. Finally, this weakness creates a security hole in networks by giving hackers access to an IoT device easily. Research has been conducted to better exploit weak passwords to improve password-cracking performance. The Markov model and probabilistic context-free-grammar (PCFG) are representative research results, and PassGAN, which uses generative adversarial networks (GANs), was recently introduced. These advanced password cracking techniques contribute to the development of better password strength checkers. We studied some methods of improving the performance of PassGAN, and developed two approaches for better password cracking: the first was changing the convolutional neural network (CNN)-based improved Wasserstein GAN (IWGAN) cost function to an RNN-based cost function; the second was employing the dual-discriminator GAN structure. In the password cracking performance experiments, our models showed 10–15% better performance than PassGAN. Through additional performance experiments with PCFG, we identified the cracking performance advantages of PassGAN and our models over PCFG. Finally, we prove that our models enhanced password strength estimation through a comparison with zxcvbn.


Author(s):  
Patrick Gage Kelley ◽  
Saranga Komanduri ◽  
Michelle L. Mazurek ◽  
Richard Shay ◽  
Timothy Vidas ◽  
...  

2011 ◽  
Author(s):  
Patrick G. Kelley ◽  
Saranga Komanduri ◽  
Michelle L. Mazurek ◽  
Rich Shay ◽  
Tim Vidas ◽  
...  

2021 ◽  
pp. 104398622110016
Author(s):  
Adam M. Bossler

The threat of formal sanctions is the criminal justice system’s primary tool to discourage online and offline deviant behavior. Yet, scholars have expressed strong concerns about the effectiveness of formal sanctions to deter cybercrime. Even more surprising is the sparsity of deterrence research in the cybercrime literature. This study examined the effects of perceived formal and informal sanctions on digital piracy, computer hacking, and online harassment in a large American college sample. Perceived formal sanctions was negatively correlated with software piracy, media piracy, password cracking, accessing accounts, sending mean messages privately online, and posting mean messages. Higher levels of perceived formal sanctions did not significantly predict any form of cybercrime, however, when controlling for informal sanctions and deviant peer associations. The implications of the findings for our ability to deter deviant behavior in cyberspace are explored.


Author(s):  
Monte Hancock ◽  
Federico Calderon ◽  
Mendi Drayton ◽  
Edward Stapleton ◽  
John Nida ◽  
...  

Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Lijuan Chen ◽  
Ying Yang ◽  
Jizhi Wang ◽  
Zhenya Chen ◽  
Liqiang Wen ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document