Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
High dictionary compression for proactive password checking
Bergadano F., Crispo B., Ruffo G. ACM Transactions on Information and System Security1 (1):3-25,1998.Type:Article
Date Reviewed: Jun 1 1999

If users are allowed to choose their own passwords, they often choose ones that hackers can find in a dictionary of common passwords. As a countermeasure, a computer system can check a password when the user chooses it, to force a non-dictionary choice. Rather than store a large dictionary, the authors suggest using a decision tree representation that may reject some non-dictionary passwords (one or two percent) but which is much faster to use and requires only three percent as much space. The approach applies artificial intelligence classification techniques. The approach is evaluated and compared with others in experiments with a large dictionary.

The paper begins with a good review of password-related vulnerabilities and previous dictionary-compression approaches. However, it does not discuss system-chosen pronounceable passwords, which are both safe and easy to remember, but might be difficult to distinguish from natural-language dictionary words and might therefore be uniformly rejected. The paper reads well in the first half but becomes quite dry in the latter part, where the experiments are reported.

Reviewer:  Jon Millen Review #: CR122256 (9906-0436)
Bookmark and Share
  Featured Reviewer  
 
Authentication (D.4.6 ... )
 
 
Authentication (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy