Essays about: "password-based authentication"

Showing result 1 - 5 of 10 essays containing the words password-based authentication.

  1. 1. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE

  2. 2. Exploring the Number of Tries Related to Cracking Passwords Generated with Different Strategies

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Marcus Birath; [2019]
    Keywords : Password; Cracking; Strategies;

    Abstract : As more services and workflows are moved into computerized systems the number of accounts a person has to be aware of is on steady increase. Today the average user is likely to have more than 25 accounts for different services used on a daily basis that all need authentication. READ MORE

  3. 3. Leveraging an Active Directory for the Generation of Honeywords

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Lundström; [2018]
    Keywords : honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Abstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE

  4. 4. Strong Authentication Protocol using PIV Card with Mobile Devices

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mao Kunning; [2013]
    Keywords : Mobile Applications Security; Strong Authentication; Smart Card;

    Abstract : Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However it has many security weaknesses and even strong passwords are not strong enough. READ MORE

  5. 5. Secure Web System in a Cloud Environment

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Bibesh Pokherl; [2013]
    Keywords : ;

    Abstract : Advent of cloud computing has brought a lot of benefits for users based on its essential characteristics. Users are attracted by its costs per use service and rapidly deploy their applications in the cloud and scale by using virtualization technology without investing in their own IT infrastructure. READ MORE