The Mathematics of (Hacking) Passwords


The science and art of password setting and cracking continues to evolve, as does the war between password users and abusers

AdvertisementContent Off-Line

We're sorry, this page is currently unavailable.


More to Explore

A Cryptanalytic Time-Memory Trade-Off. Martin E. Hellman in IEEE Transactions on Information Theory, Vol. IT-26, No. 4, pages 401–406; July 1980.

Making a Faster Cryptanalytic Time-Memory Trade-off. Philippe Oechslin in Advances in Cryptology—CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 2003. Edited by Dan Boneh. Springer, 2003.

Characterization and Improvement of Time-Memory Trade-off Based on Perfect Tables. Gildas Avoine et al. in ACM Transactions on Information and System Security, Vol. 11, No. 4; Article No. 17; July 2008.

How to Handle Rainbow Tables with External Memory. Gildas Avoine et al. in Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Edited by Josef Pieprzyk and Suriadi Suriadi. Springer International Publishing, 2017.

Digital Identity Guidelines. Paul A. Grassi et al. NIST Special Publication No. 800-63-3. National Institute of Standards and Technology, June 2017. (PDF)

NewsletterGet smart. Sign up for our email newsletter.Expertise. Insights. Illumination.

Discover world-changing science. Explore our digital archive back to 1845, including articles by more than 150 Nobel Prize winners.

Subscribe Now!D5AF5187-56F7-4844-9937BFECE4B78D53_source.png?w=385&h=375

Source Link

Articles You May Like

Antares rocket launches Cygnus cargo ship, doubling up space station deliveries
Virgin Galactic signs onto a deal to bring spaceflights to future spaceport in Italy
Turning marginal farmlands into a win for farmers and ecosystems
Young children may see nationality as biological, new study suggests
Looking back and forward: A decadelong quest for a transformative transistor