skip to main content
article
Free Access

On improvements to password security

Published:01 January 1985Publication History
Skip Abstract Section

Abstract

Due to the increasing value of information being stored in computers, it is important that unforgeable user authentication policies are implemented. Existing password authentication schemes, threats and counter-measures are described. A solution to eavesdropping problems using public-key cryptography is proposed. A technique to allow long password-phrases that makes an exhaustive search impracticable is presented.

References

  1. Diffie, W. and Hellman, M.,"New directions in cryptography", IEEE Trans. Info. Theory, Vol. IT-22(11), Nov. 1976, pp. 644--654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Evans, A., Kantrowitz, W. and Weiss, E., "A user authentication scheme not requiring secrecy in computer", CACM, Vol. 17(8), Aug. 1974, pp. 437--442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lamport, L.,"Password authentication with insecure communication", CACM, Vol. 24(11), Nov. 1981, pp. 770--772. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Morris, R. and Thompson, K., "Password security: a case history", CACM, Vol. 22(11), Nov. 1979, pp. 594--597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. National Bureau of Standards, "Guidelines on user authentication techniques for computer network access control". FIPS Pub. 83. Sept. 1980.Google ScholarGoogle Scholar
  6. Porter, S. N., "A password extension for improved human factors", Computers and Security, Vol 1(1), Jan. 1982, pp 54--56.Google ScholarGoogle ScholarCross RefCross Ref
  7. Rivest, R. L., Shamir, A. and Adleman, L., "A method of obtaining digital signatures and public-key cryptosystems", CACM. Vol. 21(2), Feb. 1978, pp. 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Wilkes, M. V., "Time sharing computer systems", Macdonald, Third edition, 1975, pp. 148--150. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 19, Issue 1
    January 1985
    56 pages
    ISSN:0163-5980
    DOI:10.1145/1041490
    Issue’s Table of Contents

    Copyright © 1985 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 January 1985

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader