Talk:Dictionary attack

From Citizendium
Revision as of 13:54, 15 August 2010 by imported>Howard C. Berkowitz (→‎Password selection; authentication; thinking aloud)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
This article is a stub and thus not approved.
Main Article
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
 Definition Attacking a password system by encrypting an entire dictionary and then checking if any stored passwords match [d] [e]
Checklist and Archives
 Workgroup category computers [Editors asked to check categories]
 Subgroup category:  Security
 Talk Archive none  English language variant Canadian English

Password selection; authentication; thinking aloud

Thinking out loud here, I wonder if there is an article inside this on password selection, for which this gives some of the reasons -- bad passwords are also subject to social engineering. It might be worth mentioning that reusable passwords aren't the ideal solution for strong authentication; there's no dictionary attack against a security token. Howard C. Berkowitz 15:05, 27 July 2010 (UTC)

I think eventually we need something at User authentication. There are relevant bits here, at Cryptography#One-way_encryption and likely elsewhere, but they need to be tied together and other methods — tokens, one-time passwords, smartcards, biometrics, ... — covered. Sandy Harris 16:28, 27 July 2010 (UTC)

Other dictionary attacks

You are aware of the efficacy of the unabridged dictionary attack on cockroaches? Howard C. Berkowitz 18:54, 15 August 2010 (UTC)