The Mathematics of (Hacking) Passwords


The science and art of password setting and cracking continues to evolve, as does the war between password users and abusers

AdvertisementContent Off-Line

We're sorry, this page is currently unavailable.


More to Explore

A Cryptanalytic Time-Memory Trade-Off. Martin E. Hellman in IEEE Transactions on Information Theory, Vol. IT-26, No. 4, pages 401–406; July 1980.

Making a Faster Cryptanalytic Time-Memory Trade-off. Philippe Oechslin in Advances in Cryptology—CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 2003. Edited by Dan Boneh. Springer, 2003.

Characterization and Improvement of Time-Memory Trade-off Based on Perfect Tables. Gildas Avoine et al. in ACM Transactions on Information and System Security, Vol. 11, No. 4; Article No. 17; July 2008.

How to Handle Rainbow Tables with External Memory. Gildas Avoine et al. in Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Edited by Josef Pieprzyk and Suriadi Suriadi. Springer International Publishing, 2017.

Digital Identity Guidelines. Paul A. Grassi et al. NIST Special Publication No. 800-63-3. National Institute of Standards and Technology, June 2017. (PDF)

NewsletterGet smart. Sign up for our email newsletter.Expertise. Insights. Illumination.

Discover world-changing science. Explore our digital archive back to 1845, including articles by more than 150 Nobel Prize winners.

Subscribe Now!D5AF5187-56F7-4844-9937BFECE4B78D53_source.png?w=385&h=375

Source Link

Articles You May Like

New automated biological-sample analysis systems to accelerate disease detection
Scientists trained a spider to jump on command to figure out how its legs work
Solar thermal energy will help China cut costs of climate action
The human brain can create structures in up to 11 dimensions
Inhibiting NF-κB improves heart function in a mouse model of Duchenne muscular dystrophy