Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms

  • Flor N
  • Shannon H
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one should attempt before brute-force password recovery. [ABSTRACT FROM AUTHOR]

Cite

CITATION STYLE

APA

Flor, N., & Shannon, H. (2011). Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms. Journal of Digital Forensics, Security and Law. https://doi.org/10.15394/jdfsl.2011.1102

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free