The Mathematics of (Hacking) Passwords

The science and art of password setting and cracking continues to evolve, as does the war between password users and abusers

AdvertisementContent Off-Line

We're sorry, this page is currently unavailable.

1

More to Explore

A Cryptanalytic Time-Memory Trade-Off. Martin E. Hellman in IEEE Transactions on Information Theory, Vol. IT-26, No. 4, pages 401–406; July 1980.

Making a Faster Cryptanalytic Time-Memory Trade-off. Philippe Oechslin in Advances in Cryptology—CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17–21, 2003. Edited by Dan Boneh. Springer, 2003.

Characterization and Improvement of Time-Memory Trade-off Based on Perfect Tables. Gildas Avoine et al. in ACM Transactions on Information and System Security, Vol. 11, No. 4; Article No. 17; July 2008.

How to Handle Rainbow Tables with External Memory. Gildas Avoine et al. in Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Edited by Josef Pieprzyk and Suriadi Suriadi. Springer International Publishing, 2017.

Digital Identity Guidelines. Paul A. Grassi et al. NIST Special Publication No. 800-63-3. National Institute of Standards and Technology, June 2017. https://doi.org/10.6028/NIST.SP.800-63-3 (PDF)

NewsletterGet smart. Sign up for our email newsletter.Expertise. Insights. Illumination.

Discover world-changing science. Explore our digital archive back to 1845, including articles by more than 150 Nobel Prize winners.

Subscribe Now!D5AF5187-56F7-4844-9937BFECE4B78D53_source.png?w=385&h=375

Source Link

« Previous article "Hair Dryer" Winds Could Strain Vulnerable Antarctic Ice Shelf
Next article » Scientists develop artificial chemical receptor to assist viral transduction for T cell engineering