Comparing password ranking algorithms on real-world password datasets

N/ACitations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Password-based authentication is the most widely used authentication mechanism. One major weakness of password-based authentication is that users generally choose predictable and weak passwords. In this paper, we address the question: How to best check weak passwords? We model different password strength checking methods as Password Ranking Algorithms (PRAs), and introduce two methods for comparing different PRAs: the β-Residual Strength Graph (β-RSG) and the Normalized β-Residual Strength Graph (β-NRSG). In our experiments, we find some password datasets that have been widely used in password research contain many problematic passwords that are not naturally created. We develop techniques to cleanse password datasets by removing these problematic accounts. We then apply the two metrics on cleansed datasets and show that several PRAs, including the dictionarybased PRA, the Markov Models with and without backoff, have similar performances. If the size of PRAs are limited in order to be able to be transmitted over the internet, a hybrid method combining a small dictionary of weak passwords and a Markov model with backoff with a limited size can provide the most accurate strength measurement.

Cite

CITATION STYLE

APA

Yang, W., Li, N., Molloy, I. M., Park, Y., & Chari, S. N. (2016). Comparing password ranking algorithms on real-world password datasets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9878 LNCS, pp. 69–90). Springer Verlag. https://doi.org/10.1007/978-3-319-45744-4_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free