• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Ping, Wang Ding, Huang Xinyi. Advances in Password Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2173-2188. DOI: 10.7544/issn1000-1239.2016.20160483
Citation: Wang Ping, Wang Ding, Huang Xinyi. Advances in Password Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2173-2188. DOI: 10.7544/issn1000-1239.2016.20160483

Advances in Password Security

More Information
  • Published Date: September 30, 2016
  • Identity authentication is the first line of defense for information systems, and passwords are the most widely used authentication method. Though there are a number of issues in passwords regarding security and usability, and various alternative authentication methods have also been successively proposed, password-based authentication will remain the dominant method in the foreseeable future due to its simplicity, low cost and easiness to change. Thus, this topic has attracted extensive interests from worldwide researchers, and many important results have been revealed. This work begins with the introduction of users’ vulnerable behaviors and details the password characteristics, distribution and reuse rate. Next we summarize the primary cracking algorithms that have appeared in the past 30 years, and classify them into groups in terms of the difference in dependence on what information is exploited by the attacker. Then, we revisit the various statistical-based evaluation metrics for measuring the strength of password distributions. Further, we compare the state-of-the-art password strength meters. Finally, we summarize our results and outline some future research trends.
  • Related Articles

    [1]He Jianhao, Li Lüzhou. An Overview of Quantum Optimization[J]. Journal of Computer Research and Development, 2021, 58(9): 1823-1834. DOI: 10.7544/issn1000-1239.2021.20210276
    [2]Xu Wenpeng, Wang Weiming, Li Hang, Yang Zhouwang, Liu Xiuping, Liu Ligang. Topology Optimization for Minimal Volume in 3D Printing[J]. Journal of Computer Research and Development, 2015, 52(1): 38-44. DOI: 10.7544/issn1000-1239.2015.20140108
    [3]Wen Renqiang, Zhong Shaobo, Yuan Hongyong, Huang Quanyi. Emergency Resource Multi-Objective Optimization Scheduling Model and Multi-Colony Ant Optimization Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1464-1472.
    [4]Wu Jianhui, Zhang Jing, Li Renfa, Liu Zhaohua. A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization[J]. Journal of Computer Research and Development, 2012, 49(9): 1883-1898.
    [5]Tang Kezong, Liu Bingxiang, Yang Jingyu, Sun Tingkai. Double Center Particle Swarm Optimization Algorithm[J]. Journal of Computer Research and Development, 2012, 49(5): 1086-1094.
    [6]Sun Dayang, Liu Yanheng, Yang Dong, Wang Aimin. Lifetime Optimizing Scheme of WSN[J]. Journal of Computer Research and Development, 2012, 49(1): 193-201.
    [7]Liu Chun'an, Wang Yuping. Dynamic Multi-Objective Optimization Evolutionary Algorithm Based on New Model[J]. Journal of Computer Research and Development, 2008, 45(4): 603-611.
    [8]Cui Zhendong, Wang Xicheng. Optimization Design of Turbine Engine Foundation on Grid[J]. Journal of Computer Research and Development, 2007, 44(10): 1652-1660.
    [9]Ma Ming, Zhou Chunguang, Zhang Libiao, Ma Jie. Fuzzy Neural Network Optimization by a Multi-Objective Particle Swarm Optimization Algorithm[J]. Journal of Computer Research and Development, 2006, 43(12): 2104-2109.
    [10]Lei Kaiyou and Qiu Yuhui. A Study of Constrained Layout Optimization Using Adaptive Particle Swarm Optimizer[J]. Journal of Computer Research and Development, 2006, 43(10): 1724-1731.
  • Cited by

    Periodical cited type(2)

    1. 张皓宇,单薇薇,方晓,王艳. 基于云桌面技术的虚拟专用网络动态资源分配方法. 电子设计工程. 2021(15): 189-193 .
    2. 刘思,张德干,刘晓欢,张婷,吴昊. 一种基于判定区域的AODV路由的自适应修复算法. 计算机研究与发展. 2020(09): 1898-1910 . 本站查看

    Other cited types(0)

Catalog

    Article views (3398) PDF downloads (2457) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return