Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez
{"title":"密码的实证分析","authors":"Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez","doi":"10.1109/ICGCIOT.2018.8753109","DOIUrl":null,"url":null,"abstract":"Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Empirical Analysis of Passwords\",\"authors\":\"Pushpa Sk, Manjunath T.N, Gireesh Babu C N, Syed Furqan Azeez\",\"doi\":\"10.1109/ICGCIOT.2018.8753109\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.\",\"PeriodicalId\":269682,\"journal\":{\"name\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2018.8753109\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2018.8753109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Almost every application and web service you join, require you to come with a password which is robust and strong enough to evade attacks. Password strength is a measure of degree to which a password is effective to any random attack. The strength of a password is a combination of length, numbers, complexity and randomness.The need to analyse the strength of a password is to flag weak passwords in order to improve password security. Although, there is not any rule that states a good password but certain guidelines can be followed to differentiate bad passwords. This paper primarily focuses on various authentication threats, steps to mitigate the threats and analysis of password strengths.