Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published December 15, 2016 | Version v1
Journal article Open

SELECTION OF HONEY WORDS FROM EXISTING USER PASSWORD

Description

We propose a basic strategy for enhancing the security of hashed passwords: the upkeep of extra "nectar words" (false passwords) associated with each customer's record. An adversary who takes a record of hashed passwords and switches the hash work can't tell if he has found the pass word or a honeyword. The attempted use of a honeyword for login sets of an alert. A collaborator server the "honeycecker" can perceive the customer mystery word from nectar words for the login routine and will set of an alarm if a honeyword is submitted Passwords are famously frail confirmation instruments. Clients every now and again pick poor passwords. An enemy who has stolen a document of hashed passwords can regularly utilize beast constrain pursuit to discover a secret key p whose hash esteem H(p) measures up to the hash esteem put away for a given client's pass-word, along these lines permitting the foe to mimic the client.

Files

Files (230.3 kB)

Name Size Download all
md5:41de36557a714b908943ad9270aa33b8
230.3 kB Download