메뉴 건너뛰기




Volumn , Issue , 2005, Pages 364-372

Fast dictionary attacks on passwords using time-space tradeoff

Author keywords

Cryptanalysis; Dictionary Attack; Markov Models; Passwords; Time Space Tradeoff

Indexed keywords

CRYPTANALYSIS; DICTIONARY ATTACK; MARKOV MODELS; PASSWORDS; TIME-SPACE TRADEOFF;

EID: 33745788833     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102168     Document Type: Conference Paper
Times cited : (376)

References (36)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proc. EUROCRYPT '00, Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 139-155. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • IEEE Computer Society
    • S. Bellovin and M. Merritt. Encrypted key exchange: password-based protocols secure against dictionary attacks. In Proc. IEEE Security and Privacy Symposium, pages 72-84. IEEE Computer Society, 1992.
    • (1992) Proc. IEEE Security and Privacy Symposium , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 6
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-hellman
    • Proc. EUROCRYPT '00, Springer
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 156-171. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 10
    • 0003532271 scopus 로고
    • UNIX password security - Ten years later
    • Springer Proc. CRYPTO '89
    • D. C. Feldmeier and P. R. Karn. UNIX password security - ten years later. In Proc. CRYPTO '89, volume 435 of LNCS, pages 44-63. Springer, 1989.
    • (1989) LNCS , vol.435 , pp. 44-63
    • Feldmeier, D.C.1    Karn, P.R.2
  • 11
    • 33646849366 scopus 로고
    • Rigorous time/space tradeoffs for inverting functions
    • ACM
    • A. Fiat and M. Naor. Rigorous time/space tradeoffs for inverting functions. In Proc. STOC '91, pages 534-541. ACM, 1991.
    • (1991) Proc. STOC '91 , pp. 534-541
    • Fiat, A.1    Naor, M.2
  • 12
    • 0015600423 scopus 로고
    • The Viterbi algorithm
    • G. D. Forney. The Viterbi algorithm. Proceedings of the IEEE, 61(3):268-278, 1973.
    • (1973) Proceedings of the IEEE , vol.61 , Issue.3 , pp. 268-278
    • Forney, G.D.1
  • 13
    • 33745793866 scopus 로고    scopus 로고
    • Password authenticated key exchange using hidden smooth subgroups
    • C. Gentry, P. MacKenzie, and Z. Ramzan. Password authenticated key exchange using hidden smooth subgroups. In these proceedings, 2005.
    • (2005) These Proceedings
    • Gentry, C.1    MacKenzie, P.2    Ramzan, Z.3
  • 14
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human random passwords
    • Proc. CRYPTO '01, Springer
    • O. Goldreich and Y. Lindell. Session-key generation using human random passwords. In Proc. CRYPTO '01, volume 2139 of LNCS, pages 408-432. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 19
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Proc. EUROCRYPT '01, Springer
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proc. EUROCRYPT '01, volume 2045 of LNCS, pages 475-494. Springer, 2001.
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 20
    • 84858929210 scopus 로고    scopus 로고
    • The Washington Post, March 28
    • B. Kerbs. DNA key to decoding human factor. The Washington Post, March 28, 2005. http://www.washingtonpost.com/wp-dyn/articles/A6098-2005Mar28.html.
    • (2005) DNA Key to Decoding Human Factor
    • Kerbs, B.1
  • 21
    • 0029733777 scopus 로고    scopus 로고
    • Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack
    • K. Kusuda and T. Matsumoto. Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack. IEICE Transactions on Fundamentals, E79-A(1):35-48, 1996.
    • (1996) IEICE Transactions on Fundamentals , vol.E79-A , Issue.1 , pp. 35-48
    • Kusuda, K.1    Matsumoto, T.2
  • 24
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Proc. Security Protocols Workshop, Springer
    • S. Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In Proc. Security Protocols Workshop, volume 1361 of LNCS. Springer, 1997.
    • (1997) LNCS , vol.1361
    • Lucks, S.1
  • 25
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two; Some limits on our capacity for processing information
    • G. A. Miller. The magical number seven, plus or minus two; Some limits on our capacity for processing information. Psychological Review, 63:81-97, 1956.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 27
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thomson. Password security: A case history. In Communications of the ACM, Vol.22, No. 11, pages 594-597, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thomson, K.2
  • 28
    • 35248858454 scopus 로고    scopus 로고
    • Making a faster cryptanalytic time-memory trade-off
    • Proc. CRYPTO '03, Springer
    • P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In Proc. CRYPTO '03, volume 2729 of LNCS, pages 617-630. Springer, 2003.
    • (2003) LNCS , vol.2729 , pp. 617-630
    • Oechslin, P.1
  • 30
    • 84858918050 scopus 로고    scopus 로고
    • Openwall Project. Wordlists collection. http://www.openwall.com/wordlists/, 2005.
    • (2005) Wordlists Collection
  • 32
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 34
    • 21644485720 scopus 로고    scopus 로고
    • A time/memory tradeoff using distinguished points: New analysis and FPGA results
    • Proc. CHES 2002, Springer
    • F. Standaert, G. Rouvroy, J.J. Quisquater, and J. Legat. A time/memory tradeoff using distinguished points: new analysis and FPGA results. In Proc. CHES 2002, volume 2523 of LNCS, pages 593-609. Springer, 2002.
    • (2002) LNCS , vol.2523 , pp. 593-609
    • Standaert, F.1    Rouvroy, G.2    Quisquater, J.J.3    Legat, J.4
  • 35
    • 35048814173 scopus 로고    scopus 로고
    • Addressing online dictionary attacks with login histories and humans-in-the-loop
    • Proc. Financial Cryptography, Springer
    • S. Stubblebine and P. van Oorschot. Addressing online dictionary attacks with login histories and humans-in-the-loop. In Proc. Financial Cryptography, volume 3110 of LNCS, pages 39-53. Springer, 2004.
    • (2004) LNCS , vol.3110 , pp. 39-53
    • Stubblebine, S.1    Van Oorschot, P.2
  • 36
    • 85084163855 scopus 로고    scopus 로고
    • Graphical dictionary and the memorable space of graphical passwords
    • USENIX
    • J. Thorpe and P. van Oorschot. Graphical dictionary and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symposium, pages 135-150. USENIX, 2004.
    • (2004) Proc. 13th USENIX Security Symposium , pp. 135-150
    • Thorpe, J.1    Van Oorschot, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.