A Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 2
Date: November 1989 Publication: Computers and Security, Volume 8, Number 9 Page(s): 675 - 689 Publisher: Elsevier Source 1: http://dx.doi.org/10.1016/0167-4048(89)90006-0 - Subscription or payment required Abstract or Summary:
While research continues on more sophisticated methods of authentication, password mechanisms remain the predominant method of identifying computer system users. In this paper, the goals of authentication are reviewed, and the strengths and vulnerabilities of password mechanisms are discussed. The 4.3 Berkeley Software Distribution (4.3BSD) version of UNIX is used as a case study throughout the paper. Several recommendations are presented for the improvement of password mechanisms. In particular, a simple extension of the UNIX password system is described that permits the use of pass-phrases. Part 2/2. Do you have additional information to contribute regarding this research paper? If so, please email siteupdates@passwordresearch.com with the details.
<-- Back to Authentication Research Paper Index |