Password guessers are instrumental for assessing the strength of passwords.
Despite their diversity and abundance, little is known about how different
guessers compare to each other. We perform in-depth analyses and comparisons of
the guessing abilities and behavior of password guessers. To extend analyses
beyond number of passwords cracked, we devise an analytical framework to
compare the types of passwords that guessers generate under various conditions
(e.g., limited training data, limited number of guesses, and dissimilar
training and target data). Our results show that guessers often produce
dissimilar guesses, even when trained on the same data. We leverage this result
to show that combinations of computationally-cheap guessers are as effective as
computationally intensive guessers, but more efficient. Our insights allow us
to provide a concrete set of recommendations for system administrators when
performing password checking.

Go to Source of this post
Author Of this post: <a href="http://arxiv.org/find/cs/1/au:+Parish_Z/0/1/0/all/0/1">Zach Parish</a> (1), <a href="http://arxiv.org/find/cs/1/au:+Cushing_C/0/1/0/all/0/1">Connor Cushing</a> (1), <a href="http://arxiv.org/find/cs/1/au:+Aggarwal_S/0/1/0/all/0/1">Shourya Aggarwal</a> (2), <a href="http://arxiv.org/find/cs/1/au:+Salehi_Abari_A/0/1/0/all/0/1">Amirali Salehi-Abari</a> (1), <a href="http://arxiv.org/find/cs/1/au:+Thorpe_J/0/1/0/all/0/1">Julie Thorpe</a> (1) ((1) Ontario Tech University (2) Indian Institute of Technology Delhi)

By admin