36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

In this the current research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually try to enforce security by mandating users to follow password creation policies. They force users to follow some rules such as a minimum length, or using symbols and numbers. However, these policies are not…mehr

Produktbeschreibung
In this the current research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually try to enforce security by mandating users to follow password creation policies. They force users to follow some rules such as a minimum length, or using symbols and numbers. However, these policies are not consistent with each other; for example, the length of a good password is different in each policy. They usually ignore the importance of usability of the password for the users. The more complex it is when users are frustrated, and the more adaptive strategies such as the addition"123" at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, to make sure that passwords that are created based on these rules are resistance against real attacks.
Autorenporträt
Sajaa G. Mohammed M.s.c in computer science and applied Mathematics/University of Baghdad/ College of Science, Research area: Mathematics, encryptions, and cryptanalysis and image processing.