At its heart, a password cracking attack is a modeling problem. An attacker makes guesses about a user’s password until they guess correctly or they give up. While the defender may limit the number of guesses an attacker is allowed, a password’s strength often depends on how hard it is for an attacker to model and reproduce the way in which a user created their password. If humans were effective at practicing unique habits or generating and remembering random values, cracking passwords would be a near impossible task. That is not the case, though. A vast majority of people still follow common patterns, from capitalizing the first letter of their password to putting numbers at the end. While people have remained mostly the same, the password security field has undergone major changes in an ongoing arms race between the attackers and defenders. The goal of this chapter is to highlight the current state of password cracking techniques, as well as discuss some of the cutting edge approaches that may become more prevalent in the near future.
CITATION STYLE
Aggarwal, S., Houshmand, S., & Weir, M. (2018). New technologies in password cracking techniques. In Intelligent Systems, Control and Automation: Science and Engineering (Vol. 93, pp. 179–198). Springer Netherlands. https://doi.org/10.1007/978-3-319-75307-2_11
Mendeley helps you to discover research relevant for your work.